beautypg.com

HP Insight Vulnerability and Patch Manager Software User Manual

Page 3

background image

Contents 3

Contents

About this guide..................................................................................................................................... 6

Where to go for additional help ................................................................................................................ 6

Website.................................................................................................................................................. 6

Introduction ........................................................................................................................................... 7

The Vulnerability and Patch Management Pack process ................................................................................ 8

Infrastructure ........................................................................................................................................... 9

Shared server configuration.................................................................................................................. 9

Distributed server configuration........................................................................................................... 11

The Vulnerability and Patch Management Pack interface............................................................................. 13

Requirements .......................................................................................................................................15

Vulnerability and Patch Management Pack................................................................................................ 15

HP Systems Insight Manager ................................................................................................................... 16

VPM Acquisition Utility (optional) ............................................................................................................. 17

Target systems ....................................................................................................................................... 17

Installation and configuration.................................................................................................................18

Installation location ................................................................................................................................ 18

Configuring Microsoft Internet Information Services .................................................................................... 18

Installing Vulnerability and Patch Management Pack................................................................................... 18

Installing from the Insight Control Management DVD.............................................................................. 19

Installing from the VPM download website ........................................................................................... 27

Installed Vulnerability and Patch Management Pack components............................................................. 27

Vulnerability and Patch Management Pack upgrades............................................................................. 29

Installing the VPM Acquisition Utility (optional)...................................................................................... 29

Post-installation configuration................................................................................................................... 34

Establishing security .......................................................................................................................... 35

Modifying the Vulnerability and Patch Management Pack settings ........................................................... 35

Configuring Vulnerability and Patch Management Pack acquisition for Red Hat Enterprise Linux.................. 37

Acquiring Vulnerability and Patch Management Pack updates ................................................................ 37

Licensing .............................................................................................................................................45

Licensing within Vulnerability and Patch Management Pack......................................................................... 45

Licensing using the HP SIM License Manager............................................................................................. 46

Adding licenses ................................................................................................................................ 46

Applying licenses to selected systems................................................................................................... 47

Vulnerability scanning...........................................................................................................................49

Provided scan definitions ........................................................................................................................ 49

Scanning for vulnerabilities ..................................................................................................................... 49

Viewing, modifying, or canceling a scheduled task ............................................................................... 51

Viewing vulnerability scan results ............................................................................................................. 53

Vulnerability scan results guidelines..................................................................................................... 53

Viewing vulnerability scan results by scan name.................................................................................... 53

Viewing scan results by system ........................................................................................................... 54

Customizing vulnerability scan definitions ................................................................................................. 55

Deleting a customized vulnerability scan ................................................................................................... 57

Deleting vulnerability scan results ............................................................................................................. 57

Deleting scan results by scan name ..................................................................................................... 57