UpPrevious Next Sheriff CSM™ Adding Assets Sheriff CSM provides different ways to add your assets: Note: The Sheriff CSM system inserts new assets automatically ...
UpPrevious Next Sheriff CSM™ Configure a Hostname for Sheriff CSM You should always configure a hostname for Sheriff CSM. This helps you identify each one unique...
UpPrevious Next Sheriff CSM™ Creating Vulnerability Scan Jobs By default, Sheriff CSM runs vulnerability scan jobs without any authentication. They are less thor...
Field Descriptions for Asset Scan Results Column/Field NameDescription Check box to select hosts. Host The IP address that identifies the host. Hostname...
UpPrevious Next Sheriff CSM™ Running Vulnerability Scans from Assets You can run vulnerability scans on individual assets. The fewer assets to scan, the sooner th...
UpPrevious Next Sheriff CSM™ Running Vulnerability Scans from Assets You can run vulnerability scans on individual assets. The fewer assets to scan, the sooner t...
UpPrevious Next Sheriff CSM™ Searching for Assets You can either search for or filter your assets by simply typing what you are looking for in the search box, in ...
UpPrevious Next Sheriff CSM™ VMware ESXi When you configure VMware ESXi to send log data to Sheriff CSM, you can use the VMware ESXi plugin to translate raw log ...