Introducing QVM – Scan Policies Tool Descriptions and Tool Tagging

IBM Security
Introducing QVM – Scan Policies
Tool Descriptions and Tool
Tagging
September 2014
©
IBM Corporation
1 2013
IBM Confidential
© 2013 IBM Corporation
IBM Security
Scan Policies - Tools
The Scan Policies are located under the Vulnerability Tab, Left
Hand Menu, Administrative > Scan Policies
2 IBM Confidential
© 2013 IBM Corporation
IBM Security
Scan Policies – Tool Descriptions
Hover over the Tool Name to see the Tool Description
3 IBM Confidential
© 2013 IBM Corporation
IBM Security
Tool Descriptions – Brief Outline
Use case:
As a user I want to know the tool network
method and what vulnerabilities it is meant to
detect
 Currently the Descriptions offer a brief description of what tool does
 Any text can be added to the Tool Descriptions
 Any information that will assist the User to select the correct tool can be added
 Help information can also be added, such as Port that needs scanned for tool to
work
 Other information such as IDS visible can also be added
4 IBM Confidential
© 2013 IBM Corporation
IBM Security
Scan Policies - Tags
5 IBM Confidential
© 2013 IBM Corporation
IBM Security
Tags - Types
1. Network Impact (Active Test/Default
Logons/Credentials/Discovery)
2. Network Protocol (FTP/HTTP/RPC)
3. Network Service (DNS/BIND/Netbios)
4. Application (Proxy/Tomcat/Web Application/Web Server)
5. Patch Scanning (Windows)
6. Programming Language (PHP/SQL)
7. Vendor (CISCO)
8. Device Type (Firewall/Router)
9. Mail Server
6 IBM Confidential
© 2013 IBM Corporation
IBM Security
Tool Tags – Functional Groups
Network
Impact
Device Type
Vendor
Programming
Language
7 IBM Confidential
Network
Protocol
Application
Patch
Scanning
© 2013 IBM Corporation
IBM Security
Summary: Tool Descriptions / Tool Tagging
Tool Descriptions –
•Detailed descriptions of tools
•Vulnerability and Network Information
Tool Tags –
•Group tool by broad functional area
•Can be used to flag up network critical
information such as network load not obvious
from tool name / description
8 IBM Confidential
© 2013 IBM Corporation