SecurityCenter 4.7 Installation Guide October 17, 2013 (Revision 2)
10 During an install/upgrade, the installer will drop a file named “SecurityCenter4” into /etc/logrotate.d/ that contains log rotate rules for the f
11 In some rare cases, a system restart will be required after the installation of SecurityCenter for all services to be properly started. Initial
12 License Upload This will present a license upload screen: Disable any pop-up blockers for this page, as they will prevent the license key uploa
13 License and Activation Code Input Page Once a valid license has been uploaded and “Next” has been clicked, a user cannot return to this page. O
14 Email Configuration Email configuration enables the system to send alerts, reports, and notifications and perform other email-based functions. E
15 LDAP Configuration LDAP Configuration Page LDAP configuration enables users to utilize their external LDAP repository for SecurityCenter logins.
16 repositories are useful in multi-SecurityCenter configurations where security installations are separate but reports are shared. “Offline” reposi
17 Organization Head Setup “Organizational users” refers to users without the admin role who perform day-to-day functions such as scanning and rep
18 Password Change Dialog After changing the password, you are automatically taken to the admin dashboard. Adding a Nessus Scanner and Test Scan Th
19 Make sure that the Scan Zone “Name” and “Ranges” have been entered before you click “Submit”. The “Description” field is optional, but is a help
2 Table of Contents Introduction ...
20 Add a Nessus Scanner To add a Nessus scanner, log in as the admin user and click “Resources” and then “Nessus Scanners”. Click “Add” and a page s
21 Before a scan is configured, SecurityCenter must push the latest set of plugins to the Nessus scanner. An “Updating Plugins” message is displayed
22 Click “Load Policy Template” and select “Full Safe Scan – Common Ports”. A page similar to the one below is displayed: Modify any of the predefi
23 To create our test scan, click “Add” and then fill out the name and description for the scan. Under “Scan Schedule”, choose “Template” and add a
24 About Tenable Network Security Tenable Network Security is relied upon by more than 20,000 organizations, including the entire U.S.
3 Introduction This document discusses the installation, initial configuration, and a sample scan using Tenable Network Security’s SecurityCenter 4.
4 Resource Requirements This section describes SecurityCenter’s minimum requirements for hardware, network, and disk storage. Note that the particul
5 Disk Space Adequate disk space is critical to a successful SecurityCenter deployment. An important consideration is that SecurityCenter saves a sn
6 The operating system must be configured in a secure manner to ensure that security controls cannot be bypassed. The network must be configur
7 java-1.6.0-openjdk.i386 (or the latest Oracle Java JRE) openssh expat gdbm libtool libtool-ltdl libxml2 ncurses readlin
8 Audit Log /opt/sc4/admin/logs/ Organization Logs /opt/sc4/orgs/<Organization Number>/logs/ Communication Interfaces User Access: HTTPS Plug
9 SecurityCenter generates a warning in the web interface if the license limit has been exceeded or is approaching capacity. Contact Tenable Sales f
Commenti su questo manuale