Preview only show first 10 pages with watermark. For full document please download

Ibm Internet Scanner Software

   EMBED


Share

Transcript

Uncovering vulnerabilities with speed and precision IBM Internet Scanner software Intelligent scanning agent Administration, access and control With dynamic check assignment, IBM Internet Internet Scanner software uses authorized Scanner ® software will identify assets and administrative access to endpoints for in-depth unearth vulnerabilities with a high degree of scanning and identifies privileged administrative accuracy and speed. accounts to gather more information about network devices. Features include: Policy management The policy management feature of Internet Scanner • Domain account registration and support software allows users to customize the policy used • Administrative access to supported endpoints for scanning; it comes preloaded with 20 standard • Obfuscation of known account administration scanning policies. Specific features include: • Database administration • Enhanced command line interface • Twenty default scanning policies • Program file location specification • Custom scanning policy • Scanner data source name (DSN) modification • Derive new template capabilities • Local logging • Edit/change policy • FlexCheck custom checks with custom executables (user-defined) • Searchable policy system (search by common vulnerabilities and exposures (CVEs), wildcards or vulnerability names) Asset identification Real-time display options Uses stack fingerprinting techniques and imports information Presents information on screen for quick identification of from already-existing asset databases within your organi- vulnerabilities and vulnerable hosts. On-screen display zation. Identifies more than 1,300 asset types (operating functions include: systems and network devices): • Host view • Integrated Networked Messaging Application Protocol • Vulnerability view (NMAP) fingerprinting • Services view • User-defined fingerprinting • Accounts view • Scan-time ping asset identification • Real-time activity monitoring with check progress • Host-file import • Active session monitoring • Host-list generator • Scan status window • Host-file export • Context-sensitive windows • Range enumeration Local scan control • Domain name system (DNS) name Gives the scan operator more precise control over the scanner • Internet Protocol (IP) address identification with tools that automate manual tasks like merging scan ses- • NetBIOS name sions. Features that save the scan operator time include: • NetBIOS domain • Operating system type • Scan now • MAC address • Stop scan • IP-stack fingerprinting • Pause/resume scan • Open-port banner identification • MultiScan session support • Merge scan sessions • Edit sensor properties • Denial of service check segregation • IBM X-Press Update™ product enhancements  Comprehensive vulnerability catalog Internet Scanner software identifies several vulnerability categories Guides the user to the root cause of a vulnerability, detailed • Backdoors descriptions of the vulnerability, remediation steps to remove the • Browser vulnerability and reference links to obtain more information about • Brute-force password guessing the vulnerability. Provides expert security information, including: • CGI-bin • Daemons • Local help • Denial-of-service • Remediation information • Distributed Component Object Model (DCOM) • Reports based upon vulnerability information • DNS Reporting • E-mail Allows quick and easy information-sharing across all levels • Firewalls of the organization. A comprehensive set of 74+ predefined • File Transfer Protocol (FTP) reports includes: • Information-gathering • Instant messaging • Executive reports • Lightweight Directory Access Protocol (LDAP) • Line-management reports • Microsoft® Windows® critical issues • Technician reports • NetBIOS • Trend reports • Network • Operating-system reports • Network file system requirements • Foreign-language support • Network information system requirements • Import custom reports • Network sniffers • Protocol spoofing • Remote procedure call (RPC) • Router switch • Shares • Simple Network Management Protocol (SNMP) • Web scan • Windows groups • Windows networking • Windows password checks • Windows password policy • Windows patches • Windows policy issues • Windows registry • Windows services • Windows users • X-Windows  Internet Scanner is designed to identify vulnerabilities for more • OpenBSD than 1,300 asset types, including the following operating systems • OpenVMS • BeOS • IBM OS/2® • BSD generic • OS-9 • Caldera OpenLinux • QNX • Caldera UnixWare • RedHat Linux • Cisco IOS • SCO Open Server • Compaq True64 • Slackware Linux • Conectiva Linux® • Solaris • Convex OS • SunOS • Debian Linux • SuSE Linux • DG/UX • Trustix Secure Linux • EnGarde Secure Linux • Turbolinux • Fedora Core • Ultrix • FreeBSD • UNICOS • HP Apollo Domain/OS • UnitedLinux • HP-UX • VxWork • IBM AIX ® Vulnerability management • IBM AS/400 ® IBM Proventia® Management SiteProtector™ central manage- • Immunix ment system controls multiple Internet Scanner agents and • IRIX provides a comprehensive enterprise vulnerability manage- • Linux-based OS ment system. • Mac OS • Mandrake Linux • Microsoft Windows (all versions) • NEC EWS-UX/V • NEC UP-UX/V • NEC UX/4800 • NetBSD • NeXTSTEP • Novell NetWare  Additional capabilities available with the SiteProtector system Remote scanning capabilities Enterprise-class scalability Controls and operates scanning agents located in remote The SiteProtector system controls and operates hundreds of geographies or behind firewalls. Remote operations include: remote scanning agents and reports on the results quickly and easily. Scalable for the largest enterprises, the SiteProtector • Start scan (scan now) system offers the following vulnerability-management features: • Edit policy • Stop scan • Pause/resume scan • Multiscanner control • Multitiered architecture Automated and schedulable commands • Distributed vulnerability collection Eliminates the need to run recurring scans manually. Task • Enterprise database support scheduler eliminates steps and saves you time with: • Multiple site support • Enterprise dashboard with vulnerability drill-down capabilities • Start scan • Multiwindow view • Stop scan • Centralized servers • Report creation Enterprise reporting • Apply IBM X-Press Update product enhancements Enables multiscanner/multiscan enterprise correlation, aggrega- User administration tion and reporting. Includes all stand-alone scanner-reporting Empowers multiple users with appropriate access to con- capabilities, plus: trol their portion of the vulnerability management process. Features include: • Enterprise multiscan reports • Precanned default reports • Administration using domain accounts (optional) • Exports reports to PDF, CSV, HTML • Administration using local accounts • Group-based reporting • Multiple user roles • Schedulable reports • Group-based user access control • Web-accessible reports • Fast analysis reports • Extensive filtering  Asset management Data and vulnerability analysis views Designed for ease and accuracy, identifies groups and man- Displays security information in real time; flexible display pro- ages your information assets through: vides granular view of event details or summary information; once an analysis view is established it can be saved, recalled • Active directory integration or shared with others users. Views include: • Prompt asset grouping • Manual asset grouping • Group-oriented analysis views • Integrated protection view • Seventeen default analysis views • Group-name customization • Right-click data navigation (fast analysis) • Group-based reporting • Custom views • Multilevel asset grouping • Vulnerability clearing • Group-based user access control • Vulnerability-incident creation • Ungrouped asset identification • Vulnerability-exception creation • Drill-down to event details Discovery and assessment • View vulnerability information Includes automatic (passive) discovery of information assets • Target-analysis mode based upon traffic analysis from your IBM Internet Security • Sensor/scanner-analysis mode Systems (ISS) security infrastructure; helps identify new assets • Data export to printer as they are added to the network and groups them according • Data export with vulnerability information to user-defined roles or holds in the “ungrouped asset” category. • Schedulable data export Updates • Graphical analysis views Receives regular security content updates to enhance scan- • Baseline and compare views ning and vulnerability management. Updates include: • Return to baseline • Group filters • X-Press Update product enhancements and service packs • Analysis view filters • Prompt updates • Custom analysis display • On demand updates • Consolidated vulnerability views • Update scheduling • Updates via Web • Updates offline when not connected • Centralized update server • Update mirrors  Administrative functions For more information • Internet proxy support To evaluate Internet Scanner software today, call 1 800 776- • Secure sockets layer (SSL)-encrypted communication 2362, e-mail [email protected], or visit: • Trusted certificate support (SSL) ibm.com/services/us/iss • Optional local documentation • Web documentation • Administrative trace (local logging) • User auditing Data maintenance • Schema documentation available • Purge data now • Purge data on schedule • Data backups • Disk defragmentation  © Copyright IBM Corporation 2007 IBM Global Services Route 100 Somers, NY 10589 U.S.A. Produced in the United States of America 04-07 All Rights Reserved IBM, the IBM logo, AIX, AS/400 and OS/2 are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. Internet Scanner, Proventia and SiteProtector and X-Press Update are trademarks or registered trademarks of Internet Security Systems, Inc., in the United States, other countries, or both. Internet Security Systems, Inc., is a wholly-owned subsidiary of International Business Machines Corporation. Portable Document Format (PDF) is a trademark of Adobe Systems Incorporated in the United States, other countries, or both. Microsoft and Windows are trademarks or registered trademarks or Microsoft Corporation in the United States, other countries, or both. Linux is a trademark or registered trademark of Linus Torvalds in the United States and other countries. Other company, product and service names may be trademarks or service marks of others. References in this publication to IBM products or services do not imply that IBM intends to make them available in all countries in which IBM operates. All performance data contained in this publication was obtained in the specific operating environment and under the conditions described above and is presented as an illustration. Performance obtained in other operating environments may vary and customers should conduct their own testing. GTD01132-USEN-00