Red Hat NETWORK 3.6 - Guía de usuario Pagina 5

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 61
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 4
Copyright © 2002-2012 Tenable Network Security, Inc.
5
INTRODUCTION
This document describes the Passive Vulnerability Scanner 3.6 architecture, installation,
operation, integration with the SecurityCenter and export of data to third parties. Please
email any comments and suggestions to [email protected].
The Passive Vulnerability Scanner 3.6 is available for the following platforms:
> Red Hat Linux ES 4
> Red Hat Linux ES 5 / CentOS 5
> Red Hat Linux ES 5 / CentOS 5 64-bit
> Red Hat Linux ES 6 / CentOS 6
> Red Hat Linux ES 6 / CentOS 6 64-bit
This document describes the Passive Vulnerability Scanner installation and operation on the
Linux platform and includes the theory and operational details related to the
implementation.
STANDARDS AND CONVENTIONS
Throughout the documentation, filenames, daemons, and executables are indicated with a
courier bold font such as gunzip, httpd, and /etc/passwd.
Command line options and keywords are also indicated with the courier bold font.
Command line examples may or may not include the command line prompt and output text
from the results of the command. Command line examples will display the command being
run in courier bold to indicate what the user typed while the sample output generated by
the system will be indicated in courier (not bold). Following is an example running of the
Unix pwd command:
# pwd
/opt/pvs
#
Important notes and considerations are highlighted with this symbol and grey text
boxes.
PASSIVE VULNERABILITY SCANNER BACKGROUND AND THEORY
Passive vulnerability scanning is the process of monitoring network traffic at the packet
layer to determine topology, clients, applications, and related security issues. Tenable has
expanded the functionality of the Passive Vulnerable Scanner (PVS) to include traffic
profiling and system compromise detection. The PVS can not only keep track of the
vulnerabilities for 20,000 to 50,000 systems at a time, it can also:
> detect when they are compromised based on application intrusion detection
Vista de pagina 4
1 2 3 4 5 6 7 8 9 10 ... 60 61

Comentarios a estos manuales

Sin comentarios