Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Adding an IBM SiteProtector Vulnerability Scanner

JSA can poll IBM InfoSphere SiteProtector appliances for vulnerability data with JDBC.

Administrators can add multiple IBM SiteProtector scanners to JSA, each with a different configuration. Multiple configurations provide JSA with the ability to query SiteProtector and only import results from specific CIDR ranges. The scan schedule determines the frequency with which the database on the SiteProtector scanner is queried for vulnerability data.

  1. Click the Admin tab.
  2. Click the VA Scanners icon.
  3. Click Add.
  4. In the Scanner Name field, type a name to identify the IBM SiteProtector scanner.
  5. From the Managed Host list, select an option that is based on one of the following platforms:
    • On the JSA Console, select the managed host that is responsible for communicating with the scanner device.

  6. From the Type list, select IBM SiteProtector Scanner.
  7. In the Hostname field, type the IP address or host name of the IBM SiteProtector that contains vulnerabilities to import.
  8. In the Port field, type 1433 as the port for the IBM SiteProtector database.
  9. In the Username field, type the username required to query the IBM SiteProtector database.
  10. In the Password field, type the password required to query the IBM SiteProtector database.
  11. In the Domain field, type the domain required, if required, to connect to the IBM SiteProtector database.

    If the database is configured for Windows and inside a domain, you must specify the domain name.

  12. In the Database Name field, type RealSecureDB as the database name.
  13. In the Database Instance field, type the database instance for the IBM SiteProtector database. If you are not using a database instance, you can leave this field blank.
  14. Select the Use Named Pipe Communication if named pipes are required to communicate to the IBM SiteProtector database. If you are using SQL authentication, disable Named Pipe Communication. By default, this check box is clear.
  15. Select the Use NTLMv2 check box if the IBM SiteProtector uses NTLMv2 as an authentication protocol. By default, this check box is clear.

    The Use NTLMv2 check box forces MSDE connections to use the NTLMv2 protocol when communicating with SQL servers that require NTLMv2 authentication. The Use NTLMv2 check box is selected, it has no effect on MSDE connections to SQL servers that do not require NTLMv2 authentication.

  16. To configure a CIDR range for the scanner:
    1. In the text field, type the CIDR range for the scan or click Browse to select a CIDR range from the network list.

    2. Click Add.

  17. Click Save.
  18. On the Admin tab, click Deploy Changes.

You are now ready to create a scan schedule. See Scheduling a Vulnerability Scan