Installation guide

43
Table 11 Remote Repository Options
Option
Description
Name
The repository name.
Description
Descriptive text for the repository.
Type
Remote
Remote Repository
Host to synchronize with to obtain the repository data. After entering the hostname or
IP address of the remote SecurityCenter, click the “Retrieve Repositories” link to enter
an admin username and password for the SecurityCenter to exchange the SSH keys.
Once completed, a list of available repositories will be populated.
Repository
Remote repository to collect IP address(es) and vulnerability data from. This is a drop-
down list of the available repository names available on the remote SecurityCenter.
IP Version
For a remote repository, this setting is determined by the remote repository and cannot
be selected.
Trending
If trending is not selected, any query that uses comparisons between
repository snapshots (e.g., trending line charts) will not be available.
This option allows for a periodic snapshot of the .nessus data for vulnerability
trending purposes. This option is useful in cases where tracking data changes is
important. In situations where repository datasets do not change frequently negating
the need for trending disable this option to minimize disk space usage.
Generate Nessus File
Use this option to schedule how frequently the Nessus file snapshot will be taken.
Available options include: Never, Daily, Weekly, Monthly (Day), and Monthly (Date).
The .nessus files generated by this process can be imported into Nessus scanners or
any third-party tool that accepts the .nessus format as required. This option is not
related to the “Sync Schedule” below, which relates to automating the synchronization
of vulnerability data between SecurityCenters.
Download Format
Allows for selecting between the Nessus v1 and v2 formats for the generated Nessus
file. When IPv6 data is used, the v2 format must be selected.
Sync Schedule
Frequency with which the local and remote repositories are synchronized.
Synchronization options include: “Never”, “Daily”, “Weekly”, “Monthly (Date)”, and
“Monthly (Day)”. Click the “Time Zone” link to ensure the Sync Schedule time is being
performed at the correct local time.
IP Ranges
Allowed ranges for importing vulnerability data. Addresses may be a single IP address,
IP range, CIDR block or any comma-delimited combination (20 K character limit).
Organizations
Organizations that have access to the vulnerability data within the repository. Within
the “Organizations” section, click the green key icon for access control options. Access
is available for the “Organization Head” user or for “All Users” within the Organization
(affects existing users only). For existing repository edits, an additional option labeled
“Existing Users” is available. This option leaves the current user access intact. Click
Submit” to apply the changes.