Red Hat NETWORK 3.6 - Betriebsanweisung Seite 14

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 61
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 13
Copyright © 2002-2012 Tenable Network Security, Inc.
14
# ps aux | grep pvs
root 25191 22.7 26.9 384388 274704 pts/2 Sl 15:26 0:05
/opt/pvs//bin/pvs
root 25194 0.1 0.6 13312 6380 pts/2 S 15:26 0:00
/opt/pvs//bin/pvs-proxy
root 25199 0.0 0.0 103300 844 pts/2 S+ 15:26 0:00 grep pvs#
Once running, the pvs binary will be managed completely by the pvs-proxy daemon.
In this mode, the PVS will store its vulnerability (.nsr files) reports in a directory monitored
by the PVS Proxy, /opt/pvs/var/pvs-proxy/scans. When the SecurityCenter connects to
the PVS Proxy, it will copy any report found in this directory to the SecurityCenter and
import it into the relevant customer databases.
Also, if the SecurityCenter has received new passive vulnerability plugins or real-time
plugins from Tenable Network Security, Inc., it will install them in the PVS plugin directory
and restart the PVS.
PVS data will be communicated to the SecurityCenter as often as it is reported. If a PVS is
configured to log its current vulnerabilities every 30 minutes, the SecurityCenter will receive
this data as soon as the SecurityCenter connects to it. If the PVS is only logging its data
once every six hours, then the SecurityCenter will only get updates every six hours.
Stopping the Passive Vulnerability Scanner
If you need to stop the PVS service for any reason, use the following command for PVS for
Red Hat and CentOS:
# service pvs stop
Stopping PVS Proxy[ OK ]
Stopping PVS[ OK ]
Or if you wish to restart the service use the command:
# service pvs restart
Starting the Passive Vulnerability Scanner Manually
This section describes how to start the PVS when it is used independently of the
SecurityCenter. Starting the PVS with the SecurityCenter was described previously in this
document.
Running PVS without specifying the full path will result in the host launching a
tool that displays information about local physical volumes, and not Tenable’s
Passive Vulnerability Scanner. Ensure that you include the full path to Tenable’s
PVS as shown below.
To start the PVS binary manually, type the following command:
# /opt/pvs/bin/pvs -c /opt/pvs/etc/pvs.conf -r report.nsr
This will print out a message that will look similar to this:
Seitenansicht 13
1 2 ... 9 10 11 12 13 14 15 16 17 18 19 ... 60 61

Kommentare zu diesen Handbüchern

Keine Kommentare