McAfee TSA00M005PAA Processor Guide - Page 131

How detections are reported

Page 131 highlights

Using the SaaS Vulnerability Scanning Service How dectections are reported • R etest Current - Runs the last test that ran previously. Use this to retest and verify that vulnerabilities previously reported have been resolved. NOTE: Selecting Denial of Service adds tests that might bring down a server. We recommend selecting this option during times when users are not accessing network resources. 7 Select a date and time for the scan, then click Confirm. Scheduling scans for devices Use this task to configure scans to be performed once or on a recurring basis. NOTE: You cannot select specific times for scans to be performed. In general, scans run at various random times on different devices. To minimize impact on network traffic, scans are not run on multiple devices at the same time. Task 1 Open the SaaS vulnerability scanning portal (click the link in the SaaS Vulnerability Scanning/PCI Certification widget on the Dashboard page of the SecurityCenter). 2 In the portal, click the Security tab to display the Security Dashboard page. 3 Under Audits, select Devices. 4 Select a device using one of these methods: • O n the Devices page, click the device name. • O n the Device Groups page, click the name of the group containing the device, then on the Devices page, click the device name. (This page appears if you have set up device groups.) A page listing details about the selected device is displayed. 5 Click Configure. 6 If you are configuring a Device Audit, for Audit Period on the General tab, select an entry from the drop-down list. Options are OnDemand, Daily, Weekly, Monthly, and Quarterly. 7 Select other options as needed. 8 Click Save. How detections are reported After scanning is completed, detailed server fingerprints, open ports, and vulnerability data are available on the SaaS vulnerability scanning portal. When audit scans discover vulnerabilities, you receive an email alert (if you have configured this option) directing you to visit the portal. There you can view scan results, detailed patch recommendations applicable to your specific system configuration, historical audit data, and printable audit reports. To access scan results, click the Security tab to display the Security Dashboard page. 131 McAfee Total Protection Service Product Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134

131
McAfee Total Protection Service Product Guide
Retest Current —
Runs the last test that ran previously. Use this to retest and verify
that vulnerabilities previously reported have been resolved.
NOTE:
Selecting Denial of Service adds tests that might bring down a server. We
recommend selecting this option during times when users are not accessing network
resources.
7
Select a date and time for the scan, then click
Confirm
.
Scheduling scans for devices
Use this task to configure scans to be performed once or on a recurring basis.
NOTE:
You cannot select specific times for scans to be performed. In general, scans run at
various random times on different devices. To minimize impact on network traffic, scans are
not run on multiple devices at the same time.
Task
1
Open the SaaS vulnerability scanning portal (click the link in the SaaS Vulnerability
Scanning/PCI Certification widget on the Dashboard page of the SecurityCenter).
2
In the portal, click the
Security
tab to display the Security Dashboard page.
3
Under Audits, select
Devices
.
4
Select a device using one of these methods:
On the Devices page, click the device name.
On the Device Groups page, click the name of the group containing the device, then
on the Devices page, click the device name. (This page appears if you have set up
device groups.)
A page listing details about the selected device is displayed.
5
Click
Configure
.
6
If you are configuring a Device Audit, for
Audit Period
on the
General
tab, select an
entry from the drop-down list. Options are
OnDemand
,
Daily
,
Weekly
,
Monthly
, and
Quarterly
.
7
Select other options as needed.
8
Click
Save
.
How detections are reported
After scanning is completed, detailed server fingerprints, open ports, and vulnerability data are
available on the SaaS vulnerability scanning portal.
When audit scans discover vulnerabilities, you receive an email alert (if you have configured
this option) directing you to visit the portal. There you can view scan results, detailed patch
recommendations applicable to your specific system configuration, historical audit data, and
printable audit reports.
To access scan results, click the Security tab to display the Security Dashboard page.
Using the SaaS Vulnerability Scanning Service
How dectections are reported