Red Hat LINUX VIRTUAL SERVER 4.7 - ADMINISTRATION Guia de Instalação Página 3

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 24
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes
Vista de página 2
3
Introduction
This document discusses the installation, initial configuration, and a sample scan using Tenable Network Security’s
SecurityCenter 4.7 (US Patent No. 7,926,113 B1, “System and Method for Managing Network Vulnerability Analysis
Systems”). Hardware and software requirements as well as detailed step-by-step instructions are included along with
important notes and warnings to help ensure the success of the deployment.
Since many of Tenable’s customers have requirements to maintain separation of duties, the SecurityCenter 4.7
documentation has been separated into the following documents to better organize the material based on the organizational
role. Note that there may be some overlap in roles as well as content provided with each of the following guides:
SecurityCenter 4.7 Installation Guide This document provides instructions for the installation of
SecurityCenter 4.7. The target audience for this document is system administrators who need to install the
SecurityCenter application. Included in this document are quick instructions for the admin user to add a Nessus
scanner and create a user account to launch a test scan to ensure SecurityCenter is correctly installed.
SecurityCenter 4.7 Upgrade Guide This document describes the process of upgrading to the latest version of
SecurityCenter 4.7.
SecurityCenter 4.7 Administration Guide This document provides instructions for the administration of
SecurityCenter by the admin user. The admin user is the first user to log into the SecurityCenter after the initial
installation and is responsible for configuration tasks such as defining organizations, repositories, Nessus scanners,
LCE servers, and PVS sensors. The admin user does not have the ability to create and launch Nessus scans.
SecurityCenter 4.7 User Guide This document provides instructions for using SecurityCenter from an
Organization Head user or lesser account.
Please email any comments and suggestions to support@tenable.com.
Users are strongly encouraged to read this entire document before installation and utilize the steps provided to ensure
deployment success.
A basic understanding of computer security, Linux/Unix, Windows, computer hardware, and Nessus vulnerability scanning
is assumed.
Standards and Conventions
Throughout the documentation, filenames, daemons, and executables are indicated with a courier bold font such as
gunzip, httpd, and /etc/passwd.
Command line options and keywords are also indicated with the courier bold font. Command line examples may or
may not include the command line prompt and output text from the results of the command. Command line examples will
display the command being run in courier bold to indicate what the user typed while the sample output generated by
the system will be indicated in courier (not bold). Following is an example running of the Unix pwd command:
# pwd
/opt/sc4/daemons
#
Important notes and considerations are highlighted with this symbol and grey text boxes.
Tips, examples, and best practices are highlighted with this symbol and white on blue text.
Vista de página 2
1 2 3 4 5 6 7 8 ... 23 24

Comentários a estes Manuais

Sem comentários