Red Hat NETWORK BASIC - USER REFERENCE GUIDE 4.0 Guida Utente Pagina 5

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa
  • Pagina
    / 79
  • Indice
  • SEGNALIBRI
  • Valutato. / 5. Basato su recensioni clienti
Vedere la pagina 4
5
Introduction
This document describes the Passive Vulnerability Scanner 4.0 (Patent 7,761,918 B2) architecture, installation,
operation, integration with SecurityCenter, and export of data to third parties. Please email any comments and
suggestions to support@tenable.com.
The Passive Vulnerability Scanner 4.0 is available for the following platforms:
Red Hat Linux ES 5 / CentOS 5 32-bit and 64-bit
Red Hat Linux ES 6 / CentOS 6 32-bit and 64-bit
Mac OS X 10.8 and 10.9 64-bit
Microsoft Windows Vista, 7, 8, Server 2008, and Server 2012
This document describes the Passive Vulnerability Scanner installation and operation on the Red Hat Linux, Mac OS X,
and Microsoft Windows platforms and includes the theory and operational details related to the implementation.
Standards and Conventions
Throughout the documentation, filenames, daemons, and executables are indicated with a courier bold font such as
gunzip, httpd, and /etc/passwd.
Command line options and keywords are also indicated with the courier bold font. Command line examples may or
may not include the command line prompt and output text from the results of the command. Command line examples will
display the command being run in courier bold to indicate what the user typed while the sample output generated by
the system will be indicated in courier (not bold). Following is an example running of the Unix pwd command:
# pwd
/opt/pvs
#
Important notes and considerations are highlighted with this symbol and grey text boxes.
Tips, examples, and best practices are highlighted with this symbol and white on blue text.
Passive Vulnerability Scanner Background and Theory
Passive vulnerability scanning is the process of monitoring network traffic at the packet layer to determine topology,
clients, applications, and related security issues. Tenable has expanded the functionality of the Passive Vulnerable
Scanner (PVS) to include traffic profiling and system compromise detection. The PVS can:
detect when systems are compromised based on application intrusion detection
highlight all interactive and encrypted network sessions
detect when new hosts are added to a network
track exactly which systems communicate with other systems and on what ports
detect what ports are served and what ports are browsed by each system
detect how many hops away each monitored host is
This document provides directions for deploying, configuring, and operating the PVS.
Vedere la pagina 4
1 2 3 4 5 6 7 8 9 10 ... 78 79

Commenti su questo manuale

Nessun commento