Red Hat NETWORK 3.6 - Uživatelská příručka Strana 56

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 61
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 55
Copyright © 2002-2012 Tenable Network Security, Inc.
56
APPENDIX 2: WORKING WITH SECURITYCENTER
ARCHITECTURE
The PVS operates under the control of a SecurityCenter that provides it with passive
vulnerability data. SecurityCenter has a variety of reporting, remediation and notification
mechanisms to efficiently distribute vulnerability information across large enterprises. In
addition, it can also control a distributed set of Nessus or other active vulnerability
scanners. By combining active and passive vulnerability scanning, SecurityCenter can be
used to efficiently and accurately manage security across large networks.
SecurityCenter can also push out new passive vulnerability plugins to multiple scanners and
distribute the results of each PVS sensor to specific organizations or system administrators.
MANAGING VULNERABILITIES
A screen capture of SecurityCenter 4 displaying a summary of vulnerabilities detected by
the PVS is shown below. These vulnerabilities can be independently viewed by many
different users with different access control. SecurityCenter also enables security managers
to issue recommendations that help guide network administrators as to which vulnerabilities
should be mitigated.
MANAGING IDS EVENTS
Starting with SecurityCenter 4, the LCE performs IDS event aggregation and automatically
makes use of any vulnerability detected by the PVS when assessing when an IDS event may
be impacting a vulnerable server.
Zobrazit stránku 55
1 2 ... 51 52 53 54 55 56 57 58 59 60 61

Komentáře k této Příručce

Žádné komentáře