HP Xw460c HP Insight Control Environment User Guide - Page 5

Deploying and securing servers, HP Vulnerability and Patch Management Pack VPM overview

Page 5 highlights

Unassigned disks...61 Reduced SCSI speed...62 Host bus balancing...62 Performing Online Analysis...62 Performing Offline Analysis...63 Data reporting...64 Generating a Static Analysis Report 65 Generating a SQL queries list 65 Generating a System Summary Report 65 Generating a SQL queries list 66 Generating a CSV File Generator Report 66 Generating a SQL queries list 66 Generating a Server Availability Report 67 Generating a SQL queries list 67 Licensing Integrity and Storage Systems 67 Licensing virtual machine hosts and virtual machine guests 67 Monitoring administration...68 Changing server monitoring status 68 Enabling virtual machine host and virtual machine guests logging 69 Monitoring parameters...70 Number of samples...71 Performance threshold setting...71 Modifying the sample rate...71 Modifying log days...71 Modifying Management Agents from the Control Panel 71 Modifying Management Agents from Internet Explorer 72 Setting performance thresholds...72 Threshold values...74 Manual Log Purge...74 5 Deploying and securing servers 75 Configuring BladeSystem servers and image installs using the HP Insight Rapid Deployment software 75 Configuring scripted installs ...75 Configuring SAN-attached scripted install 75 Configuring image installs...75 Configuring HP BladeSystem enclosures 76 Using HP Insight Rapid Deployment software 76 Deployment Console basics...76 Connecting server blades...77 Deploying the first server blade...78 Reconfiguring the server blade...78 Vulnerability scanning and deploying patches and fixes 78 HP Vulnerability and Patch Management Pack (VPM) overview 78 Provided scan definitions...79 Scanning for vulnerabilities...79 Viewing, modifying, or canceling a scheduled task 80 Viewing vulnerability scan results 80 Vulnerability scan results guidelines 80 Viewing vulnerability scan results by scan name 80 Viewing vulnerability scan results by scan system 80 Customizing vulnerability scan definitions 81 Deleting scan results...81 Deleting scan results by scan name 81 Deleting scan results by system 81 Deploying patches and fixes...81 Deploying patches and fixes based on a vulnerability scan 81 Deploying patches without a vulnerability scan 83 Viewing the patch repository...84 Table of Contents 5

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181

Unassigned disks
........................................................................................................................
61
Reduced SCSI speed
...................................................................................................................
62
Host bus balancing
.....................................................................................................................
62
Performing Online Analysis
...............................................................................................................
62
Performing Offline Analysis
...............................................................................................................
63
Data reporting
.................................................................................................................................
64
Generating a Static Analysis Report
..............................................................................................
65
Generating a SQL queries list
..................................................................................................
65
Generating a System Summary Report
...........................................................................................
65
Generating a SQL queries list
..................................................................................................
66
Generating a CSV File Generator Report
.......................................................................................
66
Generating a SQL queries list
..................................................................................................
66
Generating a Server Availability Report
.........................................................................................
67
Generating a SQL queries list
..................................................................................................
67
Licensing Integrity and Storage Systems
..............................................................................................
67
Licensing virtual machine hosts and virtual machine guests
....................................................................
67
Monitoring administration
.................................................................................................................
68
Changing server monitoring status
................................................................................................
68
Enabling virtual machine host and virtual machine guests logging
..........................................................
69
Monitoring parameters
................................................................................................................
70
Number of samples
....................................................................................................................
71
Performance threshold setting
.......................................................................................................
71
Modifying the sample rate
...........................................................................................................
71
Modifying log days
.....................................................................................................................
71
Modifying Management Agents from the Control Panel
..............................................................
71
Modifying Management Agents from Internet Explorer
...............................................................
72
Setting performance thresholds
..........................................................................................................
72
Threshold values
.........................................................................................................................
74
Manual Log Purge
.................................................................................................................................
74
5 Deploying and securing servers
..................................................................
75
Configuring BladeSystem servers and image installs using the HP Insight Rapid Deployment software
...............
75
Configuring scripted installs
..............................................................................................................
75
Configuring SAN-attached scripted install
..........................................................................................
75
Configuring image installs
.................................................................................................................
75
Configuring HP BladeSystem enclosures
.............................................................................................
76
Using HP Insight Rapid Deployment software
............................................................................................
76
Deployment Console basics
...............................................................................................................
76
Connecting server blades
..................................................................................................................
77
Deploying the first server blade
..........................................................................................................
78
Reconfiguring the server blade
..........................................................................................................
78
Vulnerability scanning and deploying patches and fixes
.............................................................................
78
HP Vulnerability and Patch Management Pack (VPM) overview
...............................................................
78
Provided scan definitions
..................................................................................................................
79
Scanning for vulnerabilities
...............................................................................................................
79
Viewing, modifying, or canceling a scheduled task
.........................................................................
80
Viewing vulnerability scan results
..................................................................................................
80
Vulnerability scan results guidelines
.........................................................................................
80
Viewing vulnerability scan results by scan name
........................................................................
80
Viewing vulnerability scan results by scan system
.......................................................................
80
Customizing vulnerability scan definitions
......................................................................................
81
Deleting scan results
...................................................................................................................
81
Deleting scan results by scan name
..........................................................................................
81
Deleting scan results by system
................................................................................................
81
Deploying patches and fixes
..............................................................................................................
81
Deploying patches and fixes based on a vulnerability scan
..............................................................
81
Deploying patches without a vulnerability scan
...............................................................................
83
Viewing the patch repository
........................................................................................................
84
Table of Contents
5