Product manual
11.2 Configuring Database Maintenance Options 178
11.2.1 Using Access™ as a database backend 178
11.2.2 Using SQL Server® as a database backend 179
11.2.3 Managing saved scan results 181
11.2.4 List scanned computers 182
11.2.5 Configure advanced database maintenance options 182
11.2.6 Configure database retention options 183
11.3 Configuring Program Updates 184
11.3.1 Configuring proxy settings 184
11.3.2 Configuring auto-update options 185
11.3.3 Installing program updates manually 186
12 Scanning Profile Editor 188
12.1 Create a new Scanning Profile 188
12.2 Configuring Vulnerabilities 189
12.2.1 Enabling vulnerability scanning 189
12.2.2 Customizing the list of vulnerabilities to be scanned 190
12.2.3 Customizing vulnerability checks properties 191
12.2.4 Setting up vulnerability check conditions 192
12.3 Configuring Patches 199
12.3.1 Enabling/disabling missing patch detection checks 200
12.3.2 Customizing the list of software patches to scan 200
12.3.3 Searching for Bulletin Information 201
12.4 Configuring Network & Software Audit options 202
12.4.1 Configuring TCP/UDP port scanning options 203
12.4.2 Configuring System Information options 204
12.4.3 Configuring Device scanning options 204
12.4.4 Configuring Applications scanning options 207
12.5 Configuring security scanning options 209
13 Utilities 212
13.1 DNS Lookup 212
13.2 Traceroute 215
13.3 Whois 216
13.4 Enumerate Computers 217
13.4.1 Starting a Security Scan 218
13.4.2 Deploying Custom Patches 218
13.4.3 Enabling Auditing Policies 218
13.5 Enumerate Users 219
13.6 SNMP Auditing 220
13.7 SNMP Walk 221
13.8 SQL Server® Audit 222
13.9 Command Line Tools 223
13.9.1 Using Insscmd.exe 223
13.9.2 Using deploycmd.exe 224
13.9.3 Using impex.exe 226
14 Script Debugger 228










