Red Hat NETWORK BASIC - USER REFERENCE GUIDE 4.0 Guida Utente Pagina 2

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa
  • Pagina
    / 79
  • Indice
  • SEGNALIBRI
  • Valutato. / 5. Basato su recensioni clienti
Vedere la pagina 1
2
Table of Contents
Introduction ......................................................................................................................................... 5
Standards and Conventions ....................................................................................................................... 5
Passive Vulnerability Scanner Background and Theory .......................................................................... 5
Pre-Installation .................................................................................................................................... 6
Hardware requirements ............................................................................................................................... 6
Software and Licensing ............................................................................................................................... 6
Download or Obtain the Software .............................................................................................................. 6
PVS Subscription ....................................................................................................................................... 6
SecurityCenter Continuous View................................................................................................................ 6
Obtain a License Key for SecurityCenter ................................................................................................... 7
Evaluation License Key or Activation Code ................................................................................................ 7
Upgrading ............................................................................................................................................ 7
Upgrading PVS on Linux ............................................................................................................................. 7
Upgrading PVS on Windows ....................................................................................................................... 8
Upgrading PVS on Mac OS X .................................................................................................................... 11
Initial Installation ............................................................................................................................... 17
Linux Installation ....................................................................................................................................... 17
Windows Installation ................................................................................................................................. 17
Mac OS X Installation ................................................................................................................................ 26
Starting and Stopping PVS for Mac OS X ................................................................................................ 32
Removing PVS .................................................................................................................................. 32
Removing PVS for Linux ........................................................................................................................... 32
Removing PVS for Windows ..................................................................................................................... 32
Removing PVS for Mac OS X .................................................................................................................... 33
Initial Configuration of the PVS Server ........................................................................................... 33
Using the PVS Interface.................................................................................................................... 35
Navigation .................................................................................................................................................. 35
Monitoring .................................................................................................................................................. 37
Results ....................................................................................................................................................... 41
Users .......................................................................................................................................................... 42
Configuration ............................................................................................................................................. 42
Command Line Operation ................................................................................................................ 47
Command Line Operations for Linux ....................................................................................................... 47
Starting the Passive Vulnerability Scanner for Linux ................................................................................ 47
Stopping the Passive Vulnerability Scanner for Linux .............................................................................. 47
File Locations........................................................................................................................................... 47
Command Line Operations for Windows ................................................................................................. 49
File Locations........................................................................................................................................... 49
Starting and Stopping PVS ...................................................................................................................... 50
Command Line Operations for Mac OS X ................................................................................................ 50
Stopping the Passive Vulnerability Scanner for Mac OS X ....................................................................... 50
File Locations........................................................................................................................................... 50
Common Command Line Options ............................................................................................................ 51
Vedere la pagina 1
1 2 3 4 5 6 7 ... 78 79

Commenti su questo manuale

Nessun commento