Product manual

5 Scanning Your Network 64
5.1 About Scanning Profiles 64
5.2 Available Scanning Profiles 64
5.2.1 Complete/Combination Scans 65
5.2.2 Vulnerability Assessment 65
5.2.3 Network & Software Audit 66
5.3 Manual scans 66
5.4 Enabling security audit policies 69
5.5 Scheduled scans 70
5.5.1 Creating a scheduled scan 71
5.5.2 Editing scheduled scan settings 79
5.5.3 Configuring scheduled scan properties 79
5.6 Agent scheduled scans 80
5.6.1 Starting an Agent scan manually 82
6 Dashboard 83
6.1 Achieving results from the dashboard 83
6.2 Using the Dashboard 84
6.3 Using the Computer Tree 84
6.3.1 Simple filtering 85
6.3.2 Advanced filtering 85
6.3.3 Grouping 86
6.3.4 Searching 87
6.4 Using Attributes 88
6.4.1 Assigning attributes to a computer 88
6.4.2 Assigning attributes to a group 89
6.4.3 Configuring attributes 89
6.5 Dashboard actions 90
6.6 Exporting issue list 91
6.7 Dashboard views 91
6.7.1 Overview 92
6.7.2 Computers view 95
6.7.3 History view 97
6.7.4 Vulnerabilities View 98
6.7.5 Patches View 99
6.7.6 Ports View 100
6.7.7 Software View 101
6.7.8 Hardware View 102
6.7.9 System Information View 103
7 Interpreting Results 104
7.1 Interpreting manual scan results 104
7.1.1 Viewing scan results 104
7.1.2 Vulnerability Level Rating 106
7.1.3 Vulnerability Assessment 108
7.1.4 Network & Software Audit 109
7.2 Loading results from the database 113