Table of Contents
Index
- 2.5D column chart 8-5
- 3D column chart 8-5
- 3D horizontal row chart 8-5
- 3D row chart 8-5
- accessing
- charts 8-3
- Grid Browser 7-4
- License Utility 5-1
- NSDB 5-1
- Session Configuration 6-6, 10-4
- User Preferences 5-1
- area chart 8-5
- axis
- changing both views 7-11
- changing individual views 7-8
- drop-down menu 7-12
- swap 7-5
- brief technical report
- about 9-4
- components 9-4
- definition 1-10, 9-2
- figure 9-4, 9-5
- chart
- 2.5D column 8-5
- 3D column 8-5
- 3D horizontal row 8-5
- 3D row 8-5
- about 1-10
- area 8-5
- background color 8-12
- creating 8-3
- customizing 8-5
- labels 8-7
- legend window 8-6, 8-8
- line 8-5
- pie 8-5
- rotating 8-14
- saving 8-14
- stacked bar 8-5
- toolbar icons 8-3
- type 8-11
- chart background color
- changing 8-12
- figure 8-13
- chart labels
- figure 8-8
- hiding 8-7, 8-8
- showing 8-7, 8-8
- chart legend
- figure 8-6
- hiding 8-6
- showing 8-6
- chart type
- changing 8-11
- figure 8-11
- Chart Wizard
- about 8-1
- figure 8-4
- charting feature
- about 8-1
- figure 8-2
- Cisco Secure Scanner
- ReadMe 2-3
- column percentages
- hiding 7-40, 7-44
- showing 7-40, 7-43
- corporate security policy 1-12
- custom report 9-2
- data
- analysis 1-7
- collection 1-6
- pivoting 7-18
- presentation 1-8
- drilling down
- definition 7-13
- figure 7-19
- electronic map 1-6
- embedded legend
- figure 8-9
- moved 8-10
- moving 8-9
- executive report
- about 9-3
- components 9-3
- definition 1-10, 9-2
- figure 9-4
- executive summary
- about 9-3
- component 9-3
- File menu
- Preferences 5-5
- Preferences button 5-5
- force scan 6-14
- full technical report
- about 9-5
- components 9-5
- definition 1-10, 9-2
- figure 9-6
- grid
- saving 7-45
- toolbar icons 7-47
- viewing 7-4
- Grid Browser 7-24
- about 1-9, 7-2
- accessing 7-4
- axis combinations 7-11
- figure 7-3
- swap axes 7-5
- tab 5-7
- Grid Browser tab
- about 5-7
- figure 5-8
- grid cell
- menu options 7-49
- grid totals
- hiding 7-40, 7-43
- showing 7-40, 7-41
- grid view
- modifying 7-5
- zooming 7-24
- host data
- data pivoting 7-18
- drilling down 7-13
- figure 7-15
- showing 7-13
- HTML Browser tab
- about 5-10
- figure 5-11
- installation 2-2, 3-3
- legend window
- embedding 8-8
- hiding 8-6
- separating 8-8
- showing 8-6
- license
- corrupted 4-10
- expired 4-10
- invalid 4-10
- one-host evaluation 4-10
- license certificate
- request 4-4
- sample 4-7
- License ID number 4-2
- license info 5-3
- license request
- dialog box 4-2
- utility 4-1
- line chart 8-5
- main screen
- about 5-1
- figure 5-2
- menu options
- main 5-2
- pop-up 5-4
- Misc tab
- about 5-11
- figure 5-12
- miscellaneous preferences 5-11
- Names tab 5-6
- about 5-6
- figure 5-6
- Network Addresses tab 6-3
- figure 6-3
- network mapping 1-6
- Network Security Database
- See NSDB 10-1
- NSDB 10-4
- about 1-9, 10-1
- accessing 10-3
- from Grid Browser 10-3
- from main window 10-3
- while data pivoting 10-4
- entry
- about 10-5
- figure 10-6
- icons 10-7
- main screen figure 10-2
- severity level 10-8
- understanding 10-5
- vulnerability list 10-9
- nudge
- about B-2
- definition 6-2
- operational solution 1-13
- OS rules B-2
- pie chart 8-5
- ping operation
- about 6-14
- configuring 6-14
- ping retries 6-15
- ping timeout 6-15
- point products 1-12
- Preferences button 5-5
- Preferences dialog box
- Grid Browser tab 5-7
- HTML Browser tab 5-10
- Misc tab 5-11
- Names tab 5-6
- Session Browser tab 5-6
- probe
- definition 6-2
- monitoring status 6-18
- process overview 9-5
- report
- brief technical 1-10, 9-2, 9-4
- components
- about 9-6
- cover page 9-3
- executive summary 9-3
- list 9-6
- locations A-2
- process overview 9-5
- cover page 9-3
- custom 9-2
- customizing A-1
- editing 9-20
- executive 1-10, 9-2, 9-3
- figure 9-17
- full technical 1-10, 9-2, 9-5
- generating 9-9
- printing 9-20
- template A-2
- about A-1
- revising A-2
- variables A-4
- viewing 9-18
- Report Wizard
- about 9-1
- figure 9-2
- restrictive policies 1-12
- result set
- about 7-1
- menu options 7-48
- subfolder 7-2
- row percentages
- hiding 7-44
- showing 7-43
- rules
- OS B-2
- service B-2
- types B-1
- user B-2
- vulnerability B-2
- Sample Session 5-1
- scan
- definition 6-1
- monitoring status 6-18
- Scanner
- functions 1-4
- installation 2-2, 3-3
- licensing 4-1
- phases 1-4
- running
- as a service 2-6
- as an application 2-5
- stopping 2-8, 3-5
- uninstalling 2-9, 3-6
- Scanner phases
- data analysis 1-7
- data collection 1-6
- data presentation 1-8
- network mapping 1-6
- reporting 1-10
- vulnerability confirmation 1-8
- Schedules tab
- about 6-5
- figure 6-5
- Security Wheel
- definition 1-13
- figure 1-13
- service 2-6
- service rules B-2
- session
- configuration 6-2
- creating 6-6
- definition 6-1
- deleting 6-21
- disabling 6-18
- modifying 6-20
- pausing 6-18
- reenabling 6-19
- renaming 6-20
- scheduling 6-21
- stopping 6-19
- Session Browser tab
- about 5-6
- figure 5-7
- Session Configuration dialog box
- about 6-2
- Network Addresses tab 6-3
- Schedules tab 6-5
- Vulnerabilities tab 6-4
- setting preferences 5-5
- severity level
- definition 10-8
- one 10-9
- three 10-9
- two 10-9
- user-defined rules B-5
- showing host data 7-13
- stacked bar chart 8-5
- swap axes
- about 7-5
- figure 7-6
- system requirements 2-2, 3-2
- tabs
- Grid Browser 5-7
- HTML Browser 5-10
- Names 5-6
- Network Addresses 6-3
- Session Browser 5-6
- terms xv
- toolbar buttons
- grid 7-3
- table 5-12
- uninstalling 2-9, 3-6
- user-defined rules
- about B-2
- creating B-6
- location B-3
- master syntax B-4
- purpose B-2
- severity level B-5
- virtual memory
- changing 2-5
- requirement 2-2
- Vulnerabilities tab
- about 6-4
- figure 6-4
- vulnerability
- confirmation 1-8
- details 1-2
- discovery 1-2
- keywords B-5
- list 10-9
- rules B-2
- vulnerability keywords
- access B-5
- Denial B-5
- Recon B-5
- zoom
- about 7-24
- button 7-39
- in 7-37
- out 7-25
- zooming 7-24







Posted: Thu Jun 29 14:04:15 PDT 2000
Copyright 1989 - 2000©Cisco Systems Inc.