- play_arrow Vulnerability Assessment Scanner Overview
- play_arrow Troubleshooting Scanners
- play_arrow AXIS Scanner
- play_arrow Beyond Security Automatic Vulnerability Detection System Scanner Overview
- play_arrow Digital Defense Inc AVS Scanner Overview
- play_arrow eEye Scanner Overview
- play_arrow IBM AppScan Enterprise Scanner Overview
- IBM AppScan Enterprise Scanner Overview
- Creating a Customer User Type for IBM AppScan Enterprise
- Enabling Integration with IBM AppScan Enterprise
- Creating an Application Deployment Map in IBM AppScan Enterprise
- Publishing Completed Reports in IBM AppScan Enterprise
- Adding an IBM AppScan Enterprise Vulnerability Scanner
- play_arrow IBM Guardium Scanner Overview
- play_arrow IBM SiteProtector Scanner Overview
- play_arrow Juniper Profiler NSM Scanner Overview
- play_arrow McAfee Vulnerability Manager Scanner Overview
- play_arrow Microsoft SCCM Scanner Overview
- play_arrow nCircle IP360 Scanner Overview
- play_arrow Nessus Scanner Overview
- play_arrow NMap Scanner Overview
- play_arrow Outpost24 Vulnerability Scanner Overview
- play_arrow Qualys Scanner Overview
- play_arrow Rapid7 NeXpose Scanners Overview
- play_arrow SAINT Security Suite Overview
- play_arrow Tenable.io Scanner Overview
- play_arrow Tenable SecurityCenter Scanner Overview
- play_arrow Scheduling a Vulnerability Scan
- play_arrow Viewing the Status Of a Vulnerability Scan
- play_arrow Supported Vulnerability Scanners
netVigilance SecureScout Scanner Overview
JSA can collect vulnerability data from an SQL database on the SecureScout scanner by polling for data with JDBC.
netVigilance SecureScout NX and SecureScout SP store scan results in an SQL database. This database can be a Microsoft MSDE or SQL Server database. To collect vulnerabilities, JSA connects to the remote database to locate the latest scan results for a given IP address. The data returned updates the asset profile in JSA with the asset IP address, discovered services, and vulnerabilities. JSA supports SecureScout scanner software version 2.6.
We suggest that administrators create a special user in your SecureScout database for JSA to poll for vulnerability data.
The database user you create must have select permissions to the following tables:
HOST
JOB
JOB_HOST
SERVICE
TCRESULT
TESTCASE
PROPERTY
PROP_VALUE
WKS
IPSORT - The database user must have execute permission for this table.
To add a scanner configuration, seeAdding a NetVigilance SecureScout Scan.