McAfee MTP08EMB3RUA Product Guide - Page 150

Managing scan devices, Discovering IP addresses in a domain, Manual and scheduled scans

Page 150 highlights

9 Using Vulnerability Scanning Managing scan devices Security level 3 (High) 2 (Medium) 1 (Low) Description Provide hackers with access to specific information stored on the host, including security settings. These vulnerabilities could result in potential misuse of the host by intruders. Examples include partial disclosure of file contents, access to certain files on the host, directory browsing, disclosure of filtering rules and security mechanisms, susceptibility to denial of service (DoS) attacks, and unauthorized use of services (such as mail relaying). Expose some sensitive information from the host, such as precise versions of services. With this information, hackers could research potential attacks to try against a host. Informational, such as open ports. Manual and scheduled scans You can run scans on demand (they are queued and completed within 24 hours of the time you configure them) or schedule them to occur daily, weekly, or monthly. Manual scans are available to test vulnerabilities identified in a previous scan that you have taken steps to resolve. These include non-invasive and "full exploit" scans. Managing scan devices Use these tasks to set up and manage the devices on which you want to run vulnerability scans. Discovering IP addresses in a domain The DNS Discovery tool identifies active IP addresses associated with a domain. Use this task to identify the IP addresses that you need to scan. Task 1 Open the vulnerability scanning portal (click the link in the Vulnerability Scanning widget on the Dashboard page of the SecurityCenter). 2 From the Security Dashboard page of the vulnerability scanning portal, under Discovery, select DNS. 3 On the DNS Discovery page, select an action. If you want to... Add a domain to run discovery on Run a discovery scan (if you have already added a domain) View results of a discovery scan (if you have already run one) Delete a domain that you added Do this... Under Add a Domain for DNS Discovery, type a domain name, select the checkbox to agree to the terms, and click Add. If no date appears in the Last Scanned column, select Not Scanned Yet, select options for the scan, then click Confirm. If a date appears in the Last Scanned column, select the domain name to display results of the last discovery scan. Click the red X in the right column of the Domain table. Discovering IP addresses in a network The network discovery tool identifies which IP addresses within a network (a specified range of IP addresses) are active. Use this task to identify the active IP addresses you need to scan within a range of IP addresses. 150 McAfee Total Protection Service 5.1.5 Product Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175

Security
level
Description
3 (High)
Provide hackers with access to specific information stored on the host, including
security settings. These vulnerabilities could result in potential misuse of the host by
intruders. Examples include partial disclosure of file contents, access to certain files
on the host, directory browsing, disclosure of filtering rules and security mechanisms,
susceptibility to denial of service (DoS) attacks, and unauthorized use of services
(such as mail relaying).
2 (Medium)
Expose some sensitive information from the host, such as precise versions of
services. With this information, hackers could research potential attacks to try
against a host.
1 (Low)
Informational, such as open ports.
Manual and scheduled scans
You can run scans on demand (they are queued and completed within 24 hours of the time you
configure them) or schedule them to occur daily, weekly, or monthly. Manual scans are available to
test vulnerabilities identified in a previous scan that you have taken steps to resolve. These include
non-invasive and "full exploit" scans.
Managing scan devices
Use these tasks to set up and manage the devices on which you want to run vulnerability scans.
Discovering IP addresses in a domain
The DNS Discovery tool identifies active IP addresses associated with a domain.
Use this task to identify the IP addresses that you need to scan.
Task
1
Open the vulnerability scanning portal (click the link in the Vulnerability Scanning widget on the
Dashboard page of the SecurityCenter).
2
From the Security Dashboard page of the vulnerability scanning portal, under Discovery, select
DNS
.
3
On the DNS Discovery page, select an action.
If you want to...
Do this...
Add a domain to run discovery on
Under Add a Domain for DNS Discovery, type a domain
name, select the checkbox to agree to the terms, and click
Add
.
Run a discovery scan (if you have
already added a domain)
If no date appears in the Last Scanned column, select
Not
Scanned Yet
, select options for the scan, then click
Confirm
.
View results of a discovery scan (if
you have already run one)
If a date appears in the Last Scanned column, select the
domain name to display results of the last discovery scan.
Delete a domain that you added
Click the red
X
in the right column of the Domain table.
Discovering IP addresses in a network
The network discovery tool identifies which IP addresses within a network (a specified range of IP
addresses) are active.
Use this task to identify the active IP addresses you need to scan within a range of IP addresses.
9
Using Vulnerability Scanning
Managing scan devices
150
McAfee Total Protection Service 5.1.5 Product Guide