For example, Web servers on a DMZ A section of a network that is not part of the internal network and is not directly part of the Internet. This is mandatory when CGI requests will be sent from a computer that is behind a firewall to a target web server that is ‘outside’ the firewall. Configure GFI LanGuard to send CGI requests through a specific proxy server.Configure how GFI LanGuard handles newly created vulnerability checks.Configure extended vulnerability scanning features that check your target computers for weak passwords, anonymous FTP A protocol used to transfer files between network computers.The options in Advanced Vulnerabilities Options are used to: (Optional) Click Advanced in the Vulnerabilities tab to launch the advanced vulnerabilities scanning options. If more than one condition is set up, define conditional operators and click OK to finalize your configuration settings.ħ. Specify required conditions and click Finish to finalize your settings.Ĭheck properties wizard - Defining conditional operatorsĦ. Define the object to examine and click Next.Ĭheck properties wizard - Set required conditionsĥ. Select the type of check to be configured and click Next.Ĭheck properties wizard - Define the object to examineĤ. From the Edit vulnerability dialog, click Conditions tab > Add.Ĭheck properties wizard - Select check typeģ. ![]() From Vulnerability Assessment Options tab > Vulnerabilities sub-tab, right-click a vulnerability from the list of vulnerabilities and select Properties.Ģ. It is therefore of paramount importance that any custom checks defined in this section are set–up by qualified personnel that are aware of the ramifications of their actions.ġ. The Conditions tab enables you to add or customize conditions, which define whether the computer or network being scanned is vulnerable, or not. ![]() An institute that shares solutions regarding system and security alerts. Use this tab to customize references and links that lead to relevant information in the OVAL A standard that promotes open and publicly available security content, and standardizes the transfer of this information across the entire spectrum of security tools and services., CVE, MS Security, Security Focus and SANS An acronym for System Administration, Networking and Security research organization. Use this tab to customize the vulnerability check description. These parameters will define whether a vulnerability check is successful or not. Use this tab to configure the operational parameters of this vulnerability check. Use this tab to customize the general details of a vulnerability check including vulnerability check name, vulnerability type, OS family, OS version, Product, Timestamp and Severity. ![]() Customize the selected vulnerability check from the tabs described below: Tab Right–click on the vulnerability to customize, select Properties.Ģ. To change the properties of a vulnerability check:ġ. Vulnerability properties dialog: General tab All the checks listed in the Vulnerabilities tab have specific properties that determine when the check is triggered and what details will be enumerated during a scan.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |