McAfee MTP08EMB3RUA Product Guide - Page 154

Deleting devices, Performing scans, Starting a scan, Devices, Con Delete, Request, Scans

Page 154 highlights

9 Using Vulnerability Scanning Performing scans Deleting devices Use this task to delete devices from your account. Task 1 Open the vulnerability scanning portal (click the link in the Vulnerability Scanning widget on the Dashboard page of the SecurityCenter). 2 From the Security Dashboard page of the vulnerability scanning portal, under Audits, select Devices. 3 Select a device using one of these methods: • On the Devices page, click the device name. • On the Device Groups page, click the name of the group containing the device, then on the Devices page, click the device name. A page listing details about the selected device is displayed. 4 Click Configure, then click the Delete tab. 5 Enter the reason for deleting the device, select the checkbox to acknowledge that you understand what happens when a device is deleted, then click Request. It takes about an hour for the device to be deleted from your account. Deleting a device permanently deletes all related security data including vulnerability reports. This data cannot be restored. Performing scans Use these tasks to set up and run vulnerability scans on devices you have added to your account. Starting a scan Use this task to set up a vulnerability scan to run in the next 24 hours for an IP address, domain, or network. Task 1 Open the vulnerability scanning portal (click the link in the Vulnerability Scanning widget on the Dashboard page of the SecurityCenter). 2 From the Security Dashboard page of the vulnerability scanning portal, under Security, select Scans. 3 From the Security Scans page, click On Demand. For each type of scan, the devices you have added to your account are listed. • IP addresses are listed under Audit. (You can filter the listing by selecting a group from the top drop-down list.) • Networks are listed under Port Discovery. • Domains are listed under DNS Discovery. 154 McAfee Total Protection Service 5.1.5 Product Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175

Deleting devices
Use this task to delete devices from your account.
Task
1
Open the vulnerability scanning portal (click the link in the Vulnerability Scanning widget on the
Dashboard page of the SecurityCenter).
2
From the Security Dashboard page of the vulnerability scanning portal, under Audits, select
Devices
.
3
Select a device using one of these methods:
On the Devices page, click the device name.
On the Device Groups page, click the name of the group containing the device, then on the
Devices page, click the device name.
A page listing details about the selected device is displayed.
4
Click
Configure
, then click the
Delete
tab.
5
Enter the reason for deleting the device, select the checkbox to acknowledge that you understand
what happens when a device is deleted, then click
Request
. It takes about an hour for the device to
be deleted from your account.
Deleting a device permanently deletes all related security data including
vulnerability reports. This data cannot be restored.
Performing scans
Use these tasks to set up and run vulnerability scans on devices you have added to your account.
Starting a scan
Use this task to set up a vulnerability scan to run in the next 24 hours for an IP address, domain, or
network.
Task
1
Open the vulnerability scanning portal (click the link in the Vulnerability Scanning widget on the
Dashboard page of the SecurityCenter).
2
From the Security Dashboard page of the vulnerability scanning portal, under Security, select
Scans
.
3
From the Security Scans page, click
On Demand
.
For each type of scan, the devices you have added to your account are listed.
IP addresses are listed under Audit. (You can filter the listing by selecting a group from the top
drop-down list.)
Networks are listed under Port Discovery.
Domains are listed under DNS Discovery.
9
Using Vulnerability Scanning
Performing scans
154
McAfee Total Protection Service 5.1.5 Product Guide