IBM Proventia Network Enterprise User Manual - Background Scanning Overview
Chapter 3: Running Your First Scans
54
IBM Internet Security Systems
Background Scanning Overview
Introduction
You can run ad hoc scans whenever necessary, but you get the greatest benefit from
Enterprise Scanner when you set up cyclical scans to run automatically in the background.
Reference:
For a description of background scanning, see “Key Concepts” on page 20.
About these
procedures
Background discovery and background assessment scans run separately, just as ad hoc
discovery and assessment scans do. The process for setting up background discovery and
background assessment scans is very similar. The process in this topic combines the
procedures for both types of scans in one set of procedures.
Before you begin
When you complete this process, you will have defined a cycle of scanning for a group of
assets that will repeat until you disable it. If you want to continue these scans after the
testing period, you can change the settings as needed for your environment. If you want
to discontinue these scans, you can stop them. The procedure for stopping the scans
follows the process for starting them.
Tip:
Use a small range of IP addresses to keep the
scan time short. Include assets that are known to have vulnerabilities, if possible.
Tips are optional
These instructions guide you through the process without explaining every detail. If you
are interested in the details, refer to the information in the Tips for different steps. If you
are not interested in the details, you can ignore the tips.