UpPrevious Next Sheriff CSM™ About Sheriff CSM Network Security Capabilities Sheriff CSM is designed primarily to help mid size organizations effectively defend t...
UpPrevious Next Sheriff CSM™ Adding Assets Sheriff CSM provides different ways to add your assets: Note: The Sheriff CSM system inserts new assets automatically ...
UpPrevious Next Sheriff CSM™ Asset Administration Managing assets occurs in Sheriff CSM in the Asset List View. This section covers the following subtopics: *...
UpPrevious Next Sheriff CSM™ Changing Other Vulnerability Scanner Options You can modify the default vulnerability scanner settings to optimize the scanner for y...
UpPrevious Next Sheriff CSM™ Configure Availability Monitoring Availability monitoring in Sheriff CSM runs from the server, and can be used to monitor availabili...
UpPrevious Next Sheriff CSM™ Configuring Network Interfaces Applies to Product: Sheriff CSM™ Sheriff Vigilante® A Sheriff CSM All in One comes with six n...
UpPrevious Next Sheriff CSM™ Configuring Network Interfaces A Sheriff CSM All in One comes with six network interfaces, numbered eth0 to eth5. Sheriff CSM uses t...
UpPrevious Next Sheriff CSM™ Creating a Custom Scan Profile You can create a custom profile and tailor it to the type of the target system you are scanning. To c...
UpPrevious Next Sheriff CSM™ Creating Credentials for Vulnerability Scans Although optional, we recommend that you use credentials to perform authenticated vulne...
UpPrevious Next Sheriff CSM™ Creating Vulnerability Scan Jobs By default, Sheriff CSM runs vulnerability scan jobs without any authentication. They are less thor...
UpPrevious Next Sheriff CSM™ Current Vulnerabilities — Asset Vulnerability Details The Asset Vulnerability Details section summarizes all current vulnerabilities...
UpPrevious Next Sheriff CSM™ Delete a User Account Important: Before deleting a user in Sheriff CSM, check to see if this user has scheduled any vulnerability sca...
UpPrevious Next Sheriff CSM™ Discovering Assets in Your Network Understanding what is in your environment is a critical step towards identifying threats and vuln...
UpPrevious Next Sheriff CSM™ Firewall Permissions Sheriff CSM components must use particular URLs, protocols, and ports to function correctly. Note: If deploying ...
UpPrevious Next Sheriff CSM™ Introduction to Sheriff CSM This guide provides information for users of the Sheriff CSM system, that are responsible for monitoring...
UpPrevious Next Sheriff CSM™ Limit User Visibility with Entities %TWISTY{ showlink="Table of Contents" hidelink="Table of Contents" start="show" showimgleft="...
UpPrevious Next Sheriff CSM™ Managing the Sheriff CSM Environment In addition to monitoring and analyzing events and alarms, there are other aspects of security ...
UpPrevious Next Sheriff CSM™ Modifying a Custom Scan Profile To modify a custom profile for vulnerability scans 1 Go to Environment Vulnerabilities Overvi...
UpPrevious Next Sheriff CSM™ Network List View Sheriff CSM provides a centralized view for managing your networks. It has a similar look and feel to the Asset Li...
UpPrevious Next Sheriff CSM™ PCI DSS 3.2 Requirement 10: Track and Monitor Access to All Network Resources and Cardholder Data Testing Procedure How Sherif...
UpPrevious Next Sheriff CSM™ PCI DSS 3.2 Requirement 2: Do Not Use Vendor Supplied Defaults for System Passwords and Other Security Parameters Testing Procedur...
UpPrevious Next Sheriff CSM™ PCI DSS 3.2 Requirement 4: Encrypt Transmission of Cardholder Data Across Open, Public Networks Testing Procedure How Sheriff C...
UpPrevious Next Sheriff CSM™ PCI DSS 3.2 Requirement 5: Protect All Systems Against Malware and Regularly Update Anti Virus Software or Programs Testing Proc...
UpPrevious Next Sheriff CSM™ PCI DSS 3.2 Requirement 6: Develop and Maintain Secure Systems and Applications Testing Procedure How Sheriff CSM Delivers S...
UpPrevious Next Sheriff CSM™ PCI DSS 3.2 Requirement 8: Identify and Authenticate Access to System Components Testing Procedure How Sheriff CSM Delivers S...
UpPrevious Next Sheriff CSM™ Running Asset Scans You can run an asset scan on individual assets. This is useful, for example, if you want to find out if anything ...
UpPrevious Next Sheriff CSM™ Running Vulnerability Scans from Assets You can run vulnerability scans on individual assets. The fewer assets to scan, the sooner th...
UpPrevious Next Sheriff CSM™ Running Vulnerability Scans from Assets You can run vulnerability scans on individual assets. The fewer assets to scan, the sooner t...
UpPrevious Next Sheriff CSM™ Search and Close Tickets Sheriff CSM lets you search for a particular ticket and use various search criteria to help you refine your...
UpPrevious Next Sheriff CSM™ System Settings for Authenticated Scans An authenticated scan is a vulnerability testing measure performed from the vantage of a logg...