beautypg.com
Contents 3
Contents
About this guide..................................................................................................................................... 6
Where to go for additional help ................................................................................................................ 6
Website.................................................................................................................................................. 6
Introduction ........................................................................................................................................... 7
The Vulnerability and Patch Management Pack process ................................................................................ 8
Infrastructure ........................................................................................................................................... 9
Shared server configuration.................................................................................................................. 9
Distributed server configuration........................................................................................................... 11
The Vulnerability and Patch Management Pack interface............................................................................. 13
Requirements .......................................................................................................................................15
Vulnerability and Patch Management Pack................................................................................................ 15
HP Systems Insight Manager ................................................................................................................... 16
VPM Acquisition Utility (optional) ............................................................................................................. 17
Target systems ....................................................................................................................................... 17
Installation and configuration.................................................................................................................18
Installation location ................................................................................................................................ 18
Configuring Microsoft Internet Information Services .................................................................................... 18
Installing Vulnerability and Patch Management Pack................................................................................... 18
Installing from the Insight Control Management DVD.............................................................................. 19
Installing from the VPM download website ........................................................................................... 27
Installed Vulnerability and Patch Management Pack components............................................................. 27
Vulnerability and Patch Management Pack upgrades............................................................................. 29
Installing the VPM Acquisition Utility (optional)...................................................................................... 29
Post-installation configuration................................................................................................................... 34
Establishing security .......................................................................................................................... 35
Modifying the Vulnerability and Patch Management Pack settings ........................................................... 35
Configuring Vulnerability and Patch Management Pack acquisition for Red Hat Enterprise Linux.................. 37
Acquiring Vulnerability and Patch Management Pack updates ................................................................ 37
Licensing .............................................................................................................................................45
Licensing within Vulnerability and Patch Management Pack......................................................................... 45
Licensing using the HP SIM License Manager............................................................................................. 46
Adding licenses ................................................................................................................................ 46
Applying licenses to selected systems................................................................................................... 47
Vulnerability scanning...........................................................................................................................49
Provided scan definitions ........................................................................................................................ 49
Scanning for vulnerabilities ..................................................................................................................... 49
Viewing, modifying, or canceling a scheduled task ............................................................................... 51
Viewing vulnerability scan results ............................................................................................................. 53
Vulnerability scan results guidelines..................................................................................................... 53
Viewing vulnerability scan results by scan name.................................................................................... 53
Viewing scan results by system ........................................................................................................... 54
Customizing vulnerability scan definitions ................................................................................................. 55
Deleting a customized vulnerability scan ................................................................................................... 57
Deleting vulnerability scan results ............................................................................................................. 57
Deleting scan results by scan name ..................................................................................................... 57