tailieunhanh - Nessus Compliance Checks Auditing System Configurations and Content
The Threat Analyzer in the Central Manager aggregates, alert information from the Managers attached to the Central Manager. The Threat Analyzer is used for analysis of alerts detected by your McAfee Network Security Sensors integrated and configured through the Managers attached to the Central Manager. The Threat Analyzer works in conjunction with the policies applied to your McAfee Network Security Sensor and Host Intrusion Prevention Sensors. For more information on policies, see IPS Configuration Guide. . | Nessus Compliance Checks Auditing System Configurations and Content August 30 2012 Revision 61 Copyright 2002-2012 Tenable Network Security Inc. Tenable Network Security Nessus and ProfessionalFeed are registered trademarks of Tenable Network Security Inc. Tenable the Tenable logo the Nessus logo and or other Tenable products referenced herein are trademarks of Tenable Network Security Inc. and may be registered in certain jurisdictions. All other product names company names marks logos and symbols may be the trademarks of their respective owners. Tenable Network Security Inc. 7063 Columbia Gateway Drive Suite 100 Columbia MD 21046 sales@ Table of Contents Nessus ProfessionalFeed and SecurityCenter Standards and Compliance Configuration Audits Data Leakage and What is an audit .6 Audit vs. Vulnerability Example Audit IBM Audit Technology Unix and Windows Configuration Compliance .nbin Nessus Windows Content Compliance .nbin Nessus Database Compliance .nbin Nessus IBM iSeries Compliance .nbin Nessus Cisco Compliance .nbin Nessus Audit Helpful Unix or Windows Nessus Credentials for Devices to be Using su sudo and su sudo for sudo su sudo Important Note Regarding Cisco IOS Example .15 Converting Windows .inf Files to .audit Files with Obtaining and Installing the Converting the .inf to . Analyzing the Correct .inf Setting Converting Unix Configuration Files to .audit Files with Obtaining and Installing the Create a MD5 Audit Create Audit File Based on One or More Configuration Creating a MAP Other Uses for the c2a Manual Tweaking of the .
đang nạp các trang xem trước