IBM Proventia Network Enterprise User Manual - Siteprotector
123
IBM Proventia Network Enterprise Scanner User Guide, Version 1.3
Chapter 9
Understanding Scanning Processes in
SiteProtector
Overview
Introduction
The best strategy for managing vulnerabilities with Enterprise Scanner is as follows:
●
Use background scanning for automated vulnerability management.
●
Use ad hoc scanning as needed to handle exceptional cases.
This chapter explains the high-level processes behind ad hoc and background scanning. It
also explains how policy settings affect those processes.
Additional
information
For detailed information about scanning behavior and about tracking scans in
SiteProtector see the following chapters:
●
Chapter 10, "Monitoring Scans" on page 135.
●
Chapter 11, "Managing Scans" on page 151.
Prerequisites
This chapter uses terms that define scanning parameters that are described in detail in the
policy descriptions in Part II, Configuring Enterprise Vulnerability Protection. Before you
continue, you should understand scanning windows (p. 89) and refresh cycles (p. 87).
In this chapter
This chapter contains the following topics:
Topic
Page
What is Perspective?
124
Defining Perspectives
125
One Way to Use Perspective
126
Scan Jobs and Related Terms
127
Types of Tasks
128
Priorities for Running Tasks
129
Stages of a Scanning Process
131
Optimizing Cycle Duration, Scan Windows, and Subtasks
132