Configuring an Authenticated Scan Of the Linux or UNIX Operating Systems
In JSA Vulnerability Manager, you can configure an authentication scan of the Linux or UNIX operating systems that are on your network. You can manually specify the credentials in the scan profile or use a credential set.
To scan by using a credential list, you must first define a central list of the credentials that are required by your operating systems. For more information, see Configuring a credential setIn JSA Vulnerability Manager, you can create a credential set for the assets in your network. During a scan, if a scan tool requires the credentials for a Linux, UNIX, or Windows operating system, the credentials are automatically passed to the scan tool from the credential set..
- Click the Vulnerabilities tab.
- In the navigation pane, select Administrative >Scan Profiles.
- On the toolbar, click Add.
When you create a scan profile, the only mandatory fields are Name and IP Addresses on the Details tab of the Scan Profile Configuration page. To configure an authenticated scan, you must also follow the remaining steps in this procedure.
- Click Use Centralized Credentials to scan your Linux or UNIX operating systems.
If a credential set is not configured and you do not manually specify the credentials, the scan tools run but no credentials are passed in.
If a credential set exists for the hosts that you are scanning, any credentials that you manually specify in the Additional Credentials tab, override your credential set.
- Click the When To Scan tab.
- In the Run Schedule list, select Manual.
- Click the Additional Credentials tab.
- In the Linux/Unix Patch Scanning area, type
the user name and password for the Linux or UNIX hosts that you want
to scan and click >.
A password is not required, if you configured secure public key authentication between your console and your scan target.
- Click Save.
- In the Scan Profiles page, click Run.