IBM Proventia Network Enterprise User Manual - page 156
Chapter 11: Managing Scans
156
IBM Internet Security Systems
Generally Expected Scanning Behaviors
Introduction
Different aspects of scanning behaviors are discussed in detail in different parts of this
guide. This topic answers some of the most common questions about how jobs are
scheduled and how they appear in the Command Jobs window.
Inheritance
Expect the following regarding inheritance:
●
There is a one-to-one correspondence between Scan Control policies and assessment
jobs. A single assessment scan covers the group that has the Scan Control policy and
any groups that inherit the policy.
●
Discovery policies are not inherited. (See “Stopping and Restarting Scan Jobs” on
page 152.)
Priority
Expect the following regarding scan priority:
●
Scans run in priority order as follows:
■
ad hoc discovery scans
■
ad hoc assessment scans (in order of asset criticality)
■
background discovery scans
■
background assessment scans (in order of asset criticality)
●
A change in processing order does not have to wait for an entire job to finish; scan
priorities can cause changes in job processing order that take effect at the completion
of the work assigned to a subtask.