In JSA Vulnerability Manager, you can configure
an authentication scan of the Linux or UNIX operating systems that
are on your network. You can manually specify the credentials in the
scan profile or use a credential set.
To scan by using a credential list, you must first define a central list of the credentials that
are required by your operating systems. For more information, see Configuring a Credential Set.
- Click the Vulnerabilities tab.
- In the navigation pane, select Administrative >Scan
Profiles.
- On the toolbar, click Add.
When you create a scan profile, the only mandatory fields are Name and IP Addresses on the Details tab of the Scan Profile Configuration page. To configure
an authenticated scan, you must also follow the remaining steps in
this procedure.
- Click Use Centralized Credentials to scan your
Linux or UNIX operating systems.
If a credential set is not configured and you do not manually
specify the credentials, the scan tools run but no credentials are
passed in.
If QVM cannot find a centralized credential set for
the hosts that you are scanning, it uses existing credentials
that you manually specify in the Additional Credentials tab.
- Click the When To Scan tab.
- In the Run Schedule list, select Manual.
- Click the Additional Credentials tab.
- In the Linux/Unix Patch Scanning area, type
the user name and password for the Linux or UNIX hosts that you want
to scan and click >.
A password is not required, if you configured secure public
key authentication between your console and your scan target.
- Click Save.
- In the Scan Profiles page, click Run.