IBM Proventia Network Enterprise User Manual - page 84
Chapter 6: Defining Background Scans
84
IBM Internet Security Systems
How Policies Apply to Ad Hoc and Background Scans
Introduction
Policies apply to ad hoc and to background scans as follows:
●
Agent policies apply to both ad hoc and background scans.
●
Asset policies apply to both ad hoc and background scans; however, you can
reconfigure some asset policies when you define an ad hoc scan.
Two types of scans
Table 27 describes ad hoc and background scans:
Asset policies and
ad hoc scans
Table 28 defines configuration options for policies used by ad hoc scans:
Changing
Assessment and
Discovery policies
An ad hoc scan initially uses any settings currently configured in the Assessment and
Discovery policies for the group. You can run the scan with those settings, or you can
modify the settings. Table 29 describes the advantages of each method:
Type of Scan
Description
Ad hoc
One-time scans that you start manually for discovery and/or assessment scans,
usually in response to network changes or newly discovered threats.
Note: You can run an ad hoc scan immediately, or you can run it only during the
scan windows defined for the group in the Scan Window policy.
Background
Automatic, recurring scans that run on separately definable refresh cycles for
discovery and for assessment scanning.
Table 27: Descriptions of ad hoc and background scans
Background asset policies that…
Are as follows:
you can reconfigure for ad hoc scans •
Assessment
•
Discovery
differ for ad hoc scans
Scan Control
contain the same settings for ad hoc
scans as for background scans
•
Assessment Credentials
•
Network Services
•
Scan Exclusion
Note: This policy applies only to assessment scans,
but it applies to both ad hoc and background scans.
•
Scan Window (optional)
Table 28: Asset policies for ad hoc and background scans
If you…
Then you…
use the configured settings
can easily start an ad hoc scan that duplicates a configured
background scan.
modify the configured
settings
cannot save the policy. Therefore, the changes apply to only that
ad hoc scan and do not affect configured background scans.
Table 29: Changes to Assessment and Discovery policies