IBM and the IBM logo are trademarks or registered trademarks of International Business Machines Corporation in the United
States, other countries, or both. ADDME, Ahead of the threat, BlackICE, Internet Scanner, Proventia, RealSecure, SecurePartner,
SecurityFusion, SiteProtector, System Scanner, Virtual Patch, X-Force and X-Press Update are trademarks or registered
trademarks of Internet Security Systems, Inc. in the United States, other countries, or both. Internet Security Systems, Inc. is a
wholly-owned subsidiary of International Business Machines Corporation.
Microsoft, Windows, and Windows NT are trademarks of Microsoft Corporation in the United States, other countries, or both.
Other company, product and service names may be trademarks or service marks of others.
References in this publication to IBM products or services do not imply that IBM intends to make them available in all countries
in which IBM operates.
Disclaimer: The information contained in this document may change without notice, and may have been altered or changed if
you have received it from a source other than IBM Internet Security Systems (IBM ISS). Use of this information constitutes
acceptance for use in an “AS IS” condition, without warranties of any kind, and any use of this information is at the user’s own
risk. IBM Internet Security Systems disclaims all warranties, either expressed or implied, including the warranties of
merchantability and fitness for a particular purpose. In no event shall IBM ISS be liable for any damages whatsoever, including
direct, indirect, incidental, consequential or special damages, arising from the use or dissemination hereof, even if IBM Internet
Security Systems has been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of
liability for consequential or incidental damages, so the foregoing limitation may not apply.
Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or
otherwise, does not necessarily constitute or imply its endorsement, recommendation, or favoring by IBM Internet Security
Systems. The views and opinions of authors expressed herein do not necessarily state or reflect those of IBM Internet Security
Systems, and shall not be used for advertising or product endorsement purposes.
Links and addresses to Internet resources are inspected thoroughly prior to release, but the ever-changing nature of the Internet
prevents IBM Internet Security Systems, Inc. from guaranteeing the content or existence of the resource. When possible, the
reference contains alternate sites or keywords that could be used to acquire the information by other methods. If you find a
broken or inappropriate link, please send an email with the topic name, link, and its behavior to
IBM Proventia Network Enterprise Scanner User Guide, Version 1.3
7
Contents
8
IBM Internet Security Systems
Preface
Overview
IntroductionThis is the User Guide for the IBM Proventia Network Enterprise Scanner appliance
(Enterprise Scanner) from IBM Internet Security Systems, Inc. (IBM ISS), which includes
the following models: the ES750 and the ES1500. The Enterprise Scanner appliance is a
vulnerability detection agent that is designed for the enterprise customer.
ScopeThis User Guide explains how to use Enterprise Scanner (and the IBM SiteProtector
system) through the entire vulnerability management process, including configuring the
agent, configuring scans, monitoring scans, tracking and remediation, and maintaining
the agent.
AudienceThis Guide is written for security analysts and managers who are responsible for
managing the vulnerabilities of assets of an enterprise network.
User backgroundTo use Enterprise Scanner you must understand your network topology and the criticality
of your assets. In addition, because Enterprise Scanner is managed through the
SiteProtector Console, you must have a working knowledge of the SiteProtector system,
including how to set up views, manage users and user permissions, and policies.
IBM Proventia Network Enterprise Scanner User Guide, Version 1.3
9
Preface
How to Use Enterprise Scanner Documentation
IntroductionThis topic describes the documentation that explains how to use Enterprise Scanner and
the SiteProtector system.
Using this guideThis guide is organized according to the workflows needed to protect your enterprise:
WorkflowDescription
Part I, Getting StartedInstall and configure the appliance.
Part II, Configuring
Enterprise Vulnerability
Protection
Part III, ScanningFollow scans through the scanning process.
Part IV, Analysis,
Tracking, and
Remediation
Part V, MaintenancePerform scheduled maintenance, such as product updates and log
Tabl e 1: Vulnerability management workflows in the User Guide
Set up a continuous scanning environment for your enterprise.
Monitor the protection status of your assets and your efforts to
remediate vulnerabilities
maintenance, as well as tasks such as troubleshooting and performing
unscheduled maintenance
Related publications The following related publications contain information that can help you use Enterprise
Scanner more effectively:
DocumentDescription
IBM Proventia Network
Enterprise Scanner Quick
Start Card
HelpContext-sensitive Help that contains procedures for tasks you
Contains out-of-the-box instructions for setting up your Enterprise
Scanner agent.
perform in the Proventia Manager and in the SiteProtector
Console.
IBM Proventia Network
Enterprise Scanner Policy
Migration Utility
Tabl e 2: Related publications for Enterprise Scanner
10
Documents available on the IBM ISS Web site that provide
information about using the SiteProtector system and the
SiteProtector Console.
Provides an overview and compares the functionality between
Enterprise Scanner and the IBM Internet Scanner Software. This
Guide discusses feature differences between the two products
and provides examples of how you can migrate from Internet
Scanner to Enterprise Scanner.
Describes the policy transition from Internet Scanner to Enterprise
Scanner. You can import an existing Internet Scanner policy and
use the utility to map it to an Enterprise Scanner policy. The utility
identifies any checks that cannot be migrated. You can then save
and export the new Enterprise Scanner policy.
IBM Internet Security Systems
How to Use Enterprise Scanner Documentation
Version of the
SiteProtector
system
You manage your Enterprise Scanner agent through a SiteProtector Console. The
information in this guide about the SiteProtector system refers to Proventia Management
SiteProtector 2.0, Service Pack 6.1 (SiteProtector DBSP 6.31).
IBM Proventia Network Enterprise Scanner User Guide, Version 1.3
11
Preface
Getting Technical Support
IntroductionIBM ISS provides technical support through its Web site and by email or telephone.
The IBM ISS Web
site
The IBM Internet Security Systems (IBM ISS) Resource Center Web site (
www.iss.net/support/
) provides direct access to online user documentation, current
http://
versions listings, detailed product literature, white papers, and the Technical Support
Knowledgebase.
Support levelsIBM ISS offers three levels of support:
●Standard
●Select
●Premium
Each level provides you with 24x7 telephone and electronic support. Select and Premium
services provide more features and benefits than the Standard service. Contact Client
Services at
clientservices@iss.net
if you do not know the level of support your
organization has selected.
Hours of supportThe following table provides hours for Technical Support at the Americas and other
locations:
LocationHours
Americas24 hours a day
All other
locations
Monday through Friday, 9:00 A.M. to 6:00 P.M. during their
local time, excluding IBM ISS published holidays
Note: If your local support office is located outside the
Americas, you may call or send an email to the Americas
office for help during off-hours.
Tabl e 3: Hours for technical support
Contact information The following table provides electronic support information and telephone numbers for
technical support requests:
Regional
Office
North America Connect to the MYISS
Latin America
Tabl e 4: Contact information for technical support
12
Electronic SupportTelephone Number
Standard:
section of our Web site:
www.iss.net
support@iss.net
(1) (888) 447-4861 (toll free)
(1) (404) 236-2700
Select and Premium:
Refer to your Welcome Kit or
call your Primary Designated
Contact for this information.
(1) (888) 447-4861 (toll free)
(1) (404) 236-2700
IBM Internet Security Systems
Getting Technical Support
Regional
Electronic SupportTelephone Number
Office
Europe, Middle
support@iss.net
(44) (1753) 845105
East, and Africa
Asia-Pacific,
Australia, and
the Philippines
Japan
support@iss.net
support@isskk.co.jp
(1) (888) 447-4861 (toll free)
(1) (404) 236-2700
Domestic: (81) (3) 5740-4065
Tabl e 4: Contact information for technical support (Continued)
IBM Proventia Network Enterprise Scanner User Guide, Version 1.3
13
Preface
14
IBM Internet Security Systems
Part I
Getting Started
Chapter 1
Introduction to Enterprise Scanner
Overview
IntroductionEnterprise Scanner is the assessment component of the IBM Proventia Enterprise Security
Platform. Enterprise Scanner is based on a model in which vulnerability detection is
treated like a continuous network monitoring task rather than the ad hoc scanning model
used by earlier vulnerability management systems. Enterprise Scanner automates the
process of discovering and assessing your network assets through continuous
background scanning of your network. This model allows you to track the remediation
effort and use reports to evaluate your network’s security status at any time.
In addition to the continuous network monitoring, Enterprise Scanner gives you the
ability to configure and run ad hoc scans. Ad hoc scanning allows you to run a one-time
scan to discover new assets or to assess the vulnerability status of existing assets at any
time. Ad hoc scans are useful when you need to take immediate action because assets
have been added to your network or new vulnerabilities have been announced.
New conceptsThe beginning chapters of this guide introduce the key concepts behind the conceptual
framework of Enterprise Scanner, including background scanning. You should familiarize
yourself with the key concepts so that you will have a basis for understanding the
approach and procedures in the rest of the guide.
For Internet
Scanner users
In this chapterThis chapter contains the following topics:
If you are an Internet Scanner user, you should read this chapter carefully. It explains
important similarities and differences between Internet Scanner and Enterprise Scanner.
Topi cPage
New Features18
Key Concepts20
Introducing Background Scanning21
Migrating from Internet Scanner22
Enterprise Scanner Communication Channels23
Component Descriptions25
The SiteProtector System Components26
IBM Proventia Network Enterprise Scanner User Guide, Version 1.3
17
Chapter 1: Introduction to Enterprise Scanner
New Features
IntroductionEnterprise Scanner Version 1.3 provides an update to the firmware, and introduces a
smaller, portable version of the appliance hardware, the ES750.
Enterprise Scanner Version 1.2 fixed some known issues, and it introduced features to
improve discovery speed and assessment accuracy:
●ICMP ping
●application fingerprinting
●SSH support
ICMP pingA discovery scan can run faster if it can determine which assets in the scanning range are
available, and then scan only those assets with operating system identification (OSID)
techniques. The ICMP ping option in the Enterprise Scanner Discovery policy determines
which assets are available, as follows:
●At the beginning of each scanning window, the agent sends four (4) ICMP ping
commands to each asset identified in the discovery policy.
●The agent considers each asset that responds to a command as available, and keeps
track of all available assets.
When to use ICMP
ping
Application
fingerprinting
Non-standard port
assignments
●The discovery scan then continues to scan only the available assets.
The ICMP ping function is especially useful in the following cases:
●The network is sparsely populated.
●Every asset on the network is configured to respond to ICMP ping commands.
To configure ICMP ping, see “Defining Assets to Discover (Discovery Policy)” on page 99.
The application fingerprinting option identifies which applications are communicating
over which ports and discovers any non-standard port usage. If you enable the
application fingerprinting option, you must select from the following:
●Run checks that apply to the protocol of the application communicating over a port,
such as HTTP.
●Run checks that apply to the specific application communicating over a port, such as
Apache running Coldfusion.
Individuals in a corporation may use non-standard port assignments thinking that the
practice increases network security. Using non-standard port assignments may make it
harder—although not impossible—for an intruder to determine which applications are
communicating on ports. The practice may also hide critical vulnerabilities from your
agent, however, which could understate the real risk to a corporate network.
When to use
Application fingerprinting is especially useful in the following cases:
application
fingerprinting
●You know that some applications on the network communicate over non-standard
ports.
18
IBM Internet Security Systems
New Features
●You are unaware of any non-standard port assignments, but you want to be sure.
To configure application fingerprinting, see “Defining Common Assessment Settings
(Assessment Policy)” on page 106.
Support for SSH
communication
protocol to run
vulnerability checks
Enterprise Scanner 1.2 can communicate with SSH-capable devices such as Unix hosts,
routers and switches through an encrypted, secure communication protocol. SSH greatly
diminishes the threat that critical information will be intercepted and used for malicious
intent. This capability allows X-Force to create new vulnerability checks for non-network
exposed services, similar to the current Windows patch checks. For more information
about SSH, go to
http://www.openssh.com/
.
To configure SSH, see “Defining Assessment Credentials (Assessment Credentials
Policy)” on page 94.
IBM Proventia Network Enterprise Scanner User Guide, Version 1.3
19
Chapter 1: Introduction to Enterprise Scanner
Key Concepts
IntroductionEnterprise Scanner is the next generation scanning appliance from IBM ISS. As a
component of the Enterprise Security Platform, Enterprise Scanner delivers true
enterprise scalability and scanning load balancing. Designed to run on Linux, Enterprise
Scanner delivers the core functionality necessary in today's enterprise environments.
Centralized controlEnterprise Scanner works with the SiteProtector system to provide centralized security
management for your enterprise assets. After you install and configure your appliance,
you use the SiteProtector Console for scan management, tracking and remediation, and
reporting.
Asset-centric
approach
Background
scanning
Ad hoc scanning
and auditing
You probably already think about your vulnerability management in terms of your assets.
You know to prioritize your efforts to protect your most critical assets first and to provide
the same type of protection for similar assets. Enterprise Scanner makes this easier by
separating policies for groups of assets from the policies for agents:
●Asset policies define scanning requirements for groups of assets, including IP
addresses to scan, checks to run, and how often to refresh information.
●Agent policies define how agents operate, including the location in the network from
which they operate. That network location is called perspective.
Background scanning is an automated, cyclical process that incorporates the key
operational concepts of the Enterprise Scanner vulnerability detection model. Background
scanning is explained in more detail in “Introducing Background Scanning” on page 21.
Enterprise Scanner supports ad hoc scanning, but it is not designed to be an auditing tool.
You could use the ad hoc scanning capability between scheduled background scans for
the following types of needs:
●For network reconfiguration, you could use ad hoc scanning to refresh your discovery
and vulnerability information.
●For a new threat, you could use ad hoc scanning to assess the risk to your assets.
Load balancingEnterprise Scanner makes it easier for you to respond to the dynamic nature of an
enterprise network. You can create pools of agents to share a scanning load. You can add
agents or remove agents without having to change any discovery or assessment
configuration parameters. You can also adjust other operational parameters to ensure that
you have the coverage you need.
Perspective
definitions
You have different expectations for scanning results based on the location of an agent in
relation to the assets it scans. For example, results would be different depending on
whether you scanned a group of assets from inside a firewall or outside a firewall. (See
“What is Perspective?” on page 124.) In Enterprise Scanner, perspective definitions serve
several purposes:
●They identify locations on your network from which scanning is performed.
●They indicate where agents are connected to your network so that load balancing can
occur across agents that share a perspective.
●They indicate the location from which groups of assets should be scanned.
20
IBM Internet Security Systems
Introducing Background Scanning
Introducing Background Scanning
IntroductionWhat does it mean to say that Enterprise Scanner is based on a model in which
vulnerability detection is treated more like a network monitoring task than it is in earlier
vulnerability management models? By adapting the network monitoring model to
vulnerability management, Enterprise Scanner provides a highly flexible scanning
environment that automatically maintains the viability of your vulnerability information.
Importance of
network monitoring
models
Network monitoring systems run continuously, always providing timely information
about the security posture of your network. For the most part, you set the system up, and
it gathers the information you need to ensure your network’s security. When network
monitoring is in place, you can spend more time analyzing vulnerability data and less
time managing the system.
Vulnerability
management needs
While you probably do not want to run scans constantly, you do want to scan your
network for new assets and assess your assets to detect vulnerabilities with a reasonable
frequency—without slowing down your network. You may also have a wide range of
assets, some of which are more valuable to you than others. If you cannot scan every asset
with the same frequency, you want to make sure your most critical assets receive the
needed level of attention.
Previous modelsIn previous models of vulnerability management, you would schedule scans to run on a
specific day and to start at an exact time. Scheduled scans have the following
consequences:
●The scan would start at the scheduled time and run until it finished, whether that took
two hours or two days.
●Long running scans could interfere with your congested network times.
●You could not prioritize scans to scan your most critical assets first.
Approach to
Background scanning recognizes the following:
background
scanning
●The most efficient way to scan may include long-running scans.
●Long-running scans should not have to run during high-traffic periods when they
could contribute to network congestion.
●Assessment priorities should focus on the most critical assets first.
Reasons to use
background
scanning
Enterprise Scanner does not require a scan to run non-stop until it finishes. Instead, a
background scan runs during selected hours of the day over multiple days. Enterprise
Scanner manages the scan, and automatically restarts the scan based on refresh cycles that
you define. Refresh cycles may last from one day to several months.
Key conceptsIn summary, the key concepts of background scanning are the following:
●You use scanning refresh cycles to define automatically recurring scans.
●You define hours of the day (scanning windows) during which scanning is allowed.
●You identify critical assets that require priority attention.
●You define locations of agents and perspectives to scan assets as network locations.
IBM Proventia Network Enterprise Scanner User Guide, Version 1.3
21
Chapter 1: Introduction to Enterprise Scanner
Migrating from Internet Scanner
IntroductionThe approach to protecting your enterprise with Enterprise Scanner is different from the
one used by Internet Scanner. If you understand the major conceptual differences before
you begin, the implementation details will make more sense to you.
What Enterprise
Scanner does not
do
Developing a
migration strategy
Enterprise Scanner is not a standalone application. It only works with assets in a
SiteProtector database. You can use it for ad hoc scanning, but it is not intended to be an
auditing tool.
For more information about developing a migration strategy, see the Enterprise Scanner-Internet Scanner Migration Guide. This Guide provides an overview and compares the
functionality between Enterprise Scanner and Internet Scanner. This Guide discusses
feature differences between the two products and provides examples of how you can
migrate from Internet Scanner to Enterprise Scanner.
Migration toolsTo migrate policies from Internet Scanner to Enterprise Scanner, download the IBM
Proventia Network Enterprise Scanner Policy Migration Utility and instructions from the IBM
ISS Download Center.
Using Internet
Scanner with
Enterprise Scanner
You can use Internet Scanner with Enterprise Scanner, which you may want to do as you
migrate from Internet Scanner. You should migrate completely to Enterprise Scanner,
however, because its tighter integration with the SiteProtector system significantly
reduces the effort and cost involved in scanning your enterprise and managing your
vulnerabilities.
Comparison tableThe following table provides a high-level comparison of the major differences between
Internet Scanner and Enterprise Scanner:
FunctionInternet ScannerEnterprise Scanner
Configuring scansDefines scans and scan
policies based on the scanner.
Identifies a specific scanner to
scan assets.
Management console Works with the SiteProtector
system or without the
SiteProtector system through
its local management interface.
Timing of scansAd hoc scans; recurring scans
when used with the
SiteProtector system.
Scan processesDiscovery and assessment in
the same process.
RemediationManual process.Automated process with
Tabl e 5: Major differences between Internet Scanner and Enterprise Scanner
Defines scans and scan
policies based on the needs of
a group of assets.
Defines an agent, or a group of
agents among which the
scanning is distributed.
Works only with the
SiteProtector system.
Ad hoc and recurring
background scanning cycles.
Separate discovery and
assessment processes.
ticketing functions in the
SiteProtector system.
22
IBM Internet Security Systems
Enterprise Scanner Communication Channels
Enterprise Scanner Communication Channels
IntroductionThis topic discusses the communication channels Enterprise Scanner uses. In normal
operations, Enterprise Scanner communicates with these external components:
●OneTrust Infrastructure
●the SiteProtector system
●user consoles
●assets on the network
Architecture
diagram
Figure 1 shows the communication paths between Enterprise Scanner and the
SiteProtector system:
Figure 1: Enterprise Scanner architecture
Network interfacesEnterprise Scanner uses network interfaces as follows:
InterfacePurpose
ManagementTo communicate with the SiteProtector system.
ScanningTo communicate with assets.
Tabl e 6: Management and scanning interfaces
IBM Proventia Network Enterprise Scanner User Guide, Version 1.3
23
Chapter 1: Introduction to Enterprise Scanner
Port usageTable 7 describes port usage from the point of view of Enterprise Scanner:
Network InterfacePortCommunication With
ManagementInbound from 3995 TCP The SiteProtector Agent Manager.
Inbound from 3994 TCPThe X-Press Update Server.
Inbound on 443 TCPThe user’s Web browser.
Inbound on 22 TCPAn SSH shell on a user’s computer.
ScanningAny TCP outbound
Any UDP
Any ICMP
Tabl e 7: Port usage for Enterprise Scanner
The assets being scanned by the agent.
24
IBM Internet Security Systems
Component Descriptions
Component Descriptions
IntroductionThis topic describes the purpose of communication between Enterprise Scanner and other
components.
OneTrust
OneTrust Infrastructure provides two services to Enterprise Scanner:
Infrastructure
●Provides the licenses for the appliance.
Note: You must acquire a new or an updated license manually on the Licensing page
in the Proventia Manager. For more information about connectivity requirements, see
“Acquiring Your Enterprise Scanner Licenses” on page 207.
●Provides updates for firmware and assessment content updates.
Note: You can configure automatic downloading and installation of updates through
the SiteProtector Console or through your Agent Manager. Updates are available
either through the IBM ISS Download Center or from a locally managed Update
Server.
User interfacesYou can access and view information gathered by the Enterprise Scanner through one or
both consoles as described in the following table:
ComponentDescription
SiteProtector ConsoleThe interface where you perform all the SiteProtector system
tasks, including the following:
•configure and manage the appliance
•create and manage security policies
•enable alerts and logging
•set up users and user permissions
•monitor security events and vulnerabilities on your network
•generate reports
Proventia ManagerA Web-based interface for managing the agent.
Tabl e 8: User Console components
IBM Proventia Network Enterprise Scanner User Guide, Version 1.3
25
Chapter 1: Introduction to Enterprise Scanner
The SiteProtector System Components
IntroductionThe SiteProtector system is a centralized management system that provides command,
control, and monitoring capabilities over all of your IBM Internet Security Systems (IBM
ISS) products, including the Enterprise Scanner appliance. The SiteProtector system
documentation provides thorough descriptions of all of its components. This topic
provides brief descriptions of the components that affect Enterprise Scanner users the
most.
The SiteProtector
system components
The following major components make up the SiteProtector system:
ComponentDescription
Agent managerThe Agent Manager provides the ability to configure, update, and
manage the appliance in the SiteProtector system. It also
manages the alternate update server, called the SiteProtector XPress Update Server.
As the appliance generates security data, the Agent manager
facilitates the data processing required for you to view the data in
the SiteProtector Console.
The appliance sends a heartbeat signal through the management
Interface to its Agent Manager on a routine basis to indicate that it
is active and to receive policies and updates from the Agent
Manager. The time between heartbeats is user-defined option.
Application ServerThe Application Server provides remote access functionality for
the SiteProtector Console.
SiteProtector DatabaseThe SiteProtector Database stores the following information:
•security data generated by your IBM ISS products
•statistics for security events
•the update status of all products
•the SiteProtector system user accounts and permissions
Update ServerA server on your internal network that contains the X-Press
Updates (XPUs) for only your licensed IBM ISS products.
Tabl e 9: The SiteProtector system components
26
IBM Internet Security Systems
Chapter 2
Installing and Configuring an Agent
Overview
IntroductionInstalling and configuring your Enterprise Scanner is a multi-stage process. The process
includes connecting the agent to the network, configuring appliance-level settings, and
configuring the appliance to connect with the SiteProtector system. This chapter explains
those tasks.
Reinstalling an
agent
In this chapterThis chapter contains the following topics:
If you need to reinstall an Enterprise Scanner agent, see “Preparing to Reinstall an
Enterprise Scanner Agent” on page 208 and “Reinstalling an Enterprise Scanner Agent”
on page 209.
Topi cPage
Before You Begin28
Process Overview29
Setting Up Your Appliance for Initial Configuration31
Configuring Appliance-Level Settings33
Configuring Explicit-Trust Authentication with an Agent Manager35
Registering Enterprise Scanner to Connect to the SiteProtector System37
Logging On to the SiteProtector Console40
IBM Proventia Network Enterprise Scanner User Guide, Version 1.3
27
Chapter 2: Installing and Configuring an Agent
Before You Begin
IntroductionThis topic provides introductory information and explains considerations for installing
your Enterprise Scanner agent.
User interfacesThe following table describes the interfaces you use for each configuration phase:
InterfacePurpose
Proventia Setup AssistantTo configure network and administrative settings for the agent
immediately after you turn on or reinstall the agent.
Proventia ManagerTo configure agent settings to enable the agent to work with the
SiteProtector system.
To monitor and troubleshoot the agent.
To change low-level settings that you chose in the Proventia Setup
Assistant.
To perform manual maintenance functions, such as manually
downloading and installing updates or manually backing up and
restoring your agent.
SiteProtector Console To set up and manage your vulnerability management processes.
To change the agent settings.
Location of your
agent—perspective
Using multiple
agents and
perspective
Tabl e 10 : Configuration interfaces
When you scan a group of assets, you anticipate and interpret results based on the
location of your agent relative to the location of the assets. Scanning a group of assets from
inside a firewall, for example, produces different results than scanning the same group of
assets from outside the firewall. In Enterprise Scanner, you use perspective to define a
logical network location.
If you plan to install multiple agents now, or in the future, you should consider
perspective before you proceed. If you do not intend to install multiple agents, you can
use the default, Global perspective.
Reference: For a complete explanation of perspective, see “What is Perspective?” on
page 124, “Defining Perspectives” on page 125, and “One Way to Use Perspective” on
page 126.
28
IBM Internet Security Systems
Process Overview
Process Overview
IntroductionFollow the Installation process checklist in this topic to determine the tasks you need to
perform to install and configure your Enterprise Scanner agent. To track your progress,
print the checklist and mark each step as you complete it.
Important
prerequisites
Installation process
checklist
Before you install and configure your agent, check the applicable Read Me document and
the known issues:
●The Read Me file lists the X-Press Updates (XPUs) that you must install.
Note: Some XPUs may apply to the SiteProtector system components, such as to the
SiteProtector database.
●To find the list of known issues, log on to the IBM ISS Knowledgebase (
www.iss.net/support/
Tip: Ty pe
3442
in the Search Text box, and select
), and then search the knowledgebase for Answer ID 3442.
Answer ID
in the Search By list.
http://
Complete these tasks to install and configure Enterprise Scanner:
DescriptionReference
9
Connect your appliance to the network and
set it up for terminal emulation.
Run the Proventia Setup Assistant to
configure appliance-level settings and initial
agent parameters.
Use the Proventia Network Enterprise Scanner Quick Start Card or see “Setting Up
Your Appliance for Initial Configuration” on
page 31.
Use the Proventia Network Enterprise Scanner Quick Start Card or see
“Configuring Appliance-Level Settings” on
page 33.
Create a backup of your system
configuration settings
Optionally, set up explicit-trust authentication
with the SiteProtector Agent Manager.
Acquire the license for your agent.“Acquiring Your Enterprise Scanner
Install the latest X-Press Updates (XPUs) for
firmware and assessment content either
manually or by setting up scheduled updates.
Configure your agent to work with the
SiteProtector system.
As an option, run verification scans to verify
your installation and to become familiar with
scanning with Enterprise Scanner.
Configure the policies that define the agent’s
characteristics.
Tabl e 11 : Stages of installation and configuration
“Backing Up Configuration Settings” on
page 204.
“Configuring Explicit-Trust Authentication
with an Agent Manager” on page 35.
Licenses” on page 207.
•Chapter 16, "Updating Enterprise
Scanner" on page 211
•Help in the Proventia Manager
“Registering Enterprise Scanner to Connect
to the SiteProtector System” on page 37.
Chapter 3, "Running Your First Scans" on
page 41.
Chapter 8, "Defining Agent Policies" on
page 109.
IBM Proventia Network Enterprise Scanner User Guide, Version 1.3
29
Chapter 2: Installing and Configuring an Agent
DescriptionReference
9
Configure policies for groups of assets that
you want an agent to scan.
Set up the SiteProtector system for
vulnerability management.
Tabl e 11 : Stages of installation and configuration (Continued)
Chapter 6, "Defining Background Scans" on
page 81 and Chapter 7, "Configuring
Discovery and Assessment Policies" on
page 97.
Chapter 12, "Interpreting Scan Results" on
page 167.
30
IBM Internet Security Systems
Loading...
+ 238 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.