- play_arrow Vulnerability Assessment Scanner Overview
- play_arrow Troubleshooting Scanners
- play_arrow AXIS Scanner
- play_arrow Beyond Security Automatic Vulnerability Detection System Scanner Overview
- play_arrow Digital Defense Inc AVS Scanner Overview
- play_arrow eEye Scanner Overview
- play_arrow IBM AppScan Enterprise Scanner Overview
- IBM AppScan Enterprise Scanner Overview
- Creating a Customer User Type for IBM AppScan Enterprise
- Enabling Integration with IBM AppScan Enterprise
- Creating an Application Deployment Map in IBM AppScan Enterprise
- Publishing Completed Reports in IBM AppScan Enterprise
- Adding an IBM AppScan Enterprise Vulnerability Scanner
- play_arrow IBM Guardium Scanner Overview
- play_arrow IBM SiteProtector Scanner Overview
- play_arrow Juniper Profiler NSM Scanner Overview
- play_arrow McAfee Vulnerability Manager Scanner Overview
- play_arrow Microsoft SCCM Scanner Overview
- play_arrow nCircle IP360 Scanner Overview
- play_arrow Nessus Scanner Overview
- play_arrow netVigilance SecureScout Scanner Overview
- play_arrow Outpost24 Vulnerability Scanner Overview
- play_arrow Qualys Scanner Overview
- play_arrow Rapid7 NeXpose Scanners Overview
- play_arrow SAINT Security Suite Overview
- play_arrow Tenable.io Scanner Overview
- play_arrow Tenable SecurityCenter Scanner Overview
- play_arrow Scheduling a Vulnerability Scan
- play_arrow Viewing the Status Of a Vulnerability Scan
- play_arrow Supported Vulnerability Scanners
Adding a NMap Remote Live Scan
JSA monitors the status of the live scan in progress and waits for the NMap server to complete the scan. After the scan completes, the vulnerability results are downloaded over SSH.
Several types of NMap port scans require NMap to run as a root user. Therefore, JSA must have access as root or you must clear the OS Detection check box. To run NMap scans with OS Detection enabled, you must provide root access credentials to JSA when you add the scanner. Alternately, you can have your administrator configure the NMap binary with setuid root. See your NMap administrator for more information.
Although there is an NMap binary on each JSA host, it is reserved for internal JSA use only. Configuring an NMap vulnerability scanner to use a JSA console or JSA managed host as the remote NMap scanner is not supported and can cause instabilities.
You are now ready to create a scan schedule. See Scheduling a Vulnerability Scan