IBM Proventia Network Enterprise User Manual - Possible Scenarios
Possible Scenarios
185
IBM Proventia Network Enterprise Scanner User Guide, Version 1.3
Possible Scenarios
Introduction
The tracking features available with Enterprise Scanner and SiteProtector are adaptable,
and you can easily integrate them with your company’s workflow. This topic suggests
some ways to use the tracking and remediation features.
What assets are
vulnerable to
attacks?
Scenario:
You want to check all assets on the network for vulnerabilities.
Action plan:
Run an assessment scan to identify which assets on the network have
vulnerabilities that have not been patched. If you find vulnerable assets, create a ticket to
patch the vulnerabilities.
What assets are on
the network?
Scenario:
You do not want assets added to the network without approval. You want to
know what assets are currently running on your network.
Action plan:
Run a discovery scan to identify all assets on the network. If you find an
unauthorized asset, create a ticket to locate the asset and take appropriate action.
What services are
running?
Scenario:
You want to verify that assets on your network are running only approved
services.
Action plan:
Identify services you do not want to run on any assets in the network. Run an
assessment scan to determine what services are running on network assets. Enterprise
Scanner can scan for TCP services, UDP services, or both. Create a ticket to investigate and
disable unauthorized services or remove assets from the network.
What operating
systems are
running?
Scenario:
You want to verify that assets on the network are running only approved
operating systems.
Action plan:
Run a discovery scan for the range of IP addresses for active assets. Identify
any assets running unapproved or outdated operating systems. Create a ticket to locate
assets that are out of compliance, and update their operating systems.