
Copyright © 2002-2012 Tenable Network Security, Inc.
> highlight all interactive and encrypted network sessions
> detect when new hosts are added to a network
> track exactly which systems communicate with other systems and on what ports
> detect what ports are served and what ports are browsed by each system
> detect how many hops away each monitored host is
This document provides directions for deploying, configuring and operating the PVS. Please
see the PVS Overview whitepaper in the Expert Resources section of the Tenable web site for
a description of the PVS technology and example use cases.
PRE-INSTALLATION
To ensure a streamlined installation process, it is important to ensure that the appropriate
hardware, software and licensing requirements are in place prior to installation.
HARDWARE REQUIREMENTS
Enterprise networks can vary in performance, capacity, protocols and overall activity. PVS
deployments should consider raw network speed, the size of the network being monitored
and the configuration of the PVS application when determining resource requirements.
The following chart outlines some basic hardware requirements for operating PVS:
Passive Vulnerability
Scanner managing up to
20,000 – 50,000 hosts *
CPU: 1 dual-core 2 GHz CPU
Memory: 2 GB RAM (4 GB RAM recommended)
Passive Vulnerability
Scanner managing in
excess of 50,000 hosts
CPU: 1 dual-core 3 GHz CPU (2 dual-core recommended)
Memory: 2 GB RAM (4 GB RAM recommended)
HDD: 72 GB at 10,000 rpm (72 GB at 15,000 rpm
recommended)
* Note: The ability to monitor a given number of hosts rests heavily on the
bandwidth, memory, and processor power available to the system running PVS.
Please research your VM software vendor for recommendations as VMs typically
see a 12 to 30% loss in efficiency compared with dedicated servers.
Processor requirements will increase with greater throughput and number of network
interfaces. Memory requirements will increase for networks with more hosts. The
requirements for both of these components are affected by options such as a long report-
lifetime and enabling some or all of the PVS optional services in the configuration file.
Komentáře k této Příručce