McAfee TSA00M005PAA Processor Guide - Page 130

Performing scans

Page 130 highlights

Using the SaaS Vulnerability Scanning Service Performing scans 5 Click Configure, then click the Delete tab. 6 Enter the reason for deleting the device, select the checkbox to acknowledge that you understand what happens when a device is deleted, then click Request. It takes about an hour for the device to be deleted from your account. NOTE: Deleting a device permanently deletes all related security data including vulnerability reports. This data cannot be restored. Performing scans Use these tasks to set up and run vulnerability scans on devices you have added to your account. Tasks • S tarting a scan on page 130 Use this task to set up a vulnerability scan to run in the next 24 hours for an IP address, domain, or network. • S cheduling scans for devices on page 131 Use this task to configure scans to be performed once or on a recurring basis. Starting a scan Use this task to set up a vulnerability scan to run in the next 24 hours for an IP address, domain, or network. Task 1 Open the SaaS vulnerability scanning portal (click the link in the SaaS Vulnerability Scanning/PCI Certification widget on the Dashboard page of the SecurityCenter). 2 In the portal, click the Security tab to display the Security Dashboard page. 3 Under Security, select Scans. 4 From the Security Scans page, click On Demand. For each type of scan, the devices you have added to your account are listed. • IP addresses are listed under Audit. (You can filter the listing by selecting a group from the top drop-down list.) • N etworks are listed under Port Discovery. • D omains are listed under DNS Discovery. 5 Select the devices to scan in a single category, then select Next. NOTE: You can set up only one type of scan at a time. Click the Next button that appears directly under the device listing to continue setting up that type of scan. 6 If you are configuring an audit, select the type of audit from the drop-down list. • H ack Simulation - Runs the standard device audit. • D enial of Service - Adds extra tests. McAfee Total Protection Service Product Guide 130

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134

McAfee Total Protection Service Product Guide
130
5
Click
Configure,
then click the
Delete
tab.
6
Enter the reason for deleting the device, select the checkbox to acknowledge that you
understand what happens when a device is deleted, then click
Request
. It takes about an
hour for the device to be deleted from your account.
NOTE:
Deleting a device permanently deletes all related security data including
vulnerability reports. This data cannot be restored.
Performing scans
Use these tasks to set up and run vulnerability scans on devices you have added to
your account.
Tasks
Starting a scan on page 130
Use this task to set up a vulnerability scan to run in the next 24 hours for an IP address,
domain, or network.
Scheduling scans for devices on page 131
Use this task to configure scans to be performed once or on a recurring basis.
Starting a scan
Use this task to set up a vulnerability scan to run in the next 24 hours for an IP address,
domain, or network.
Task
1
Open the SaaS vulnerability scanning portal (click the link in the SaaS Vulnerability
Scanning/PCI Certification widget on the Dashboard page of the SecurityCenter).
2
In the portal, click the
Security
tab to display the Security Dashboard page.
3
Under Security, select
Scans
.
4
From the Security Scans page, click
On Demand
.
For each type of scan, the devices you
have added to your account are listed.
IP addresses are listed under Audit. (You can filter the listing by selecting a group from
the top drop-down list.)
Networks are listed under Port Discovery.
Domains are listed under DNS Discovery.
5
Select the devices to scan in a single category, then select
Next
.
NOTE:
You can set up only one type of scan at a time. Click the Next button that appears
directly under the device listing to continue setting up that type of scan.
6
If you are configuring an audit, select the type of audit from the drop-down list.
Hack Simulation —
Runs the standard device audit.
Denial of Service —
Adds extra tests.
Using the SaaS Vulnerability Scanning Service
Performing scans