Installation guide

2
Table of Contents
Introduction ......................................................................................................................................... 5
Standards and Conventions ....................................................................................................................... 5
Abbreviations ............................................................................................................................................... 6
SecurityCenter Administrator Functions ................................................................................................... 6
Starting/Halting SecurityCenter .................................................................................................................. 6
SecurityCenter Home Page/Dashboard ............................................................................................ 7
System Configuration ......................................................................................................................... 9
Configuration ............................................................................................................................................... 9
Basic .......................................................................................................................................................... 9
Mail .......................................................................................................................................................... 10
LDAP ....................................................................................................................................................... 11
Expiration ................................................................................................................................................. 13
Update ..................................................................................................................................................... 14
Authentication .......................................................................................................................................... 14
Reporting/Scanning ................................................................................................................................. 16
Miscellaneous .......................................................................................................................................... 17
Diagnostics ................................................................................................................................................ 18
Preferences ................................................................................................................................................ 19
Basic ........................................................................................................................................................ 19
Notifications ............................................................................................................................................. 19
Keys ............................................................................................................................................................ 20
Remote LCE Key Exchange .................................................................................................................... 21
Publishing Sites ......................................................................................................................................... 21
SSL Client Certificate Authentication ....................................................................................................... 23
Configure SecurityCenter for Certificates ........................................................................................ 23
Connect with SSL Certificate Enabled Browser ............................................................................... 24
CoSign Configuration Instructions ........................................................................................................... 26
Resource Management ..................................................................................................................... 27
Nessus Scanners ....................................................................................................................................... 27
Adding a Nessus Scanner........................................................................................................................ 28
Configure SecurityCenter for Custom Certificates to Verify Hostname ...................................... 29
Nessus Perimeter Service Scanners ........................................................................................................ 30
Nessus Scanner Details ........................................................................................................................... 32
Scan Zones ............................................................................................................................................. 32
Passive Vulnerability Scanners ................................................................................................................ 33
Log Correlation Engines ........................................................................................................................... 35
Log Correlation Engine Clients ................................................................................................................ 37
Data Management ............................................................................................................................. 40
Repositories ............................................................................................................................................... 40
Local Repository ...................................................................................................................................... 41
Remote Repository .................................................................................................................................. 42
Offline Repository .................................................................................................................................... 44
Accept Risk Rules ..................................................................................................................................... 46
Recast Risk Rules ...................................................................................................................................... 47