cc/td/doc/product/iaabu/csscan/csscan2
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Index

Index

Numerics


2.5D column chart     8-5

3D column chart     8-5

3D horizontal row chart     8-5

3D row chart     8-5

A


accessing
charts     8-3
Grid Browser     7-4
License Utility     5-1
NSDB     5-1
Session Configuration     6-6, 10-4
User Preferences     5-1

area chart     8-5

axis
changing both views     7-11
changing individual views     7-8
drop-down menu     7-12
swap     7-5

B


brief technical report
about     9-4
components     9-4
definition     1-10, 9-2
figure     9-4, 9-5

C


chart
2.5D column     8-5
3D column     8-5
3D horizontal row     8-5
3D row     8-5
about     1-10
area     8-5
background color     8-12
creating     8-3
customizing     8-5
labels     8-7
legend window     8-6, 8-8
line     8-5
pie     8-5
rotating     8-14
saving     8-14
stacked bar     8-5
toolbar icons     8-3
type     8-11

chart background color
changing     8-12
figure     8-13

chart labels
figure     8-8
hiding     8-7, 8-8
showing     8-7, 8-8

chart legend
figure     8-6
hiding     8-6
showing     8-6

chart type
changing     8-11
figure     8-11

Chart Wizard
about     8-1
figure     8-4

charting feature
about     8-1
figure     8-2

Cisco Secure Scanner
ReadMe     2-3

column percentages
hiding     7-40, 7-44
showing     7-40, 7-43

corporate security policy     1-12

custom report     9-2

D


data
analysis     1-7
collection     1-6
pivoting     7-18
presentation     1-8

drilling down
definition     7-13
figure     7-19

E


electronic map     1-6

embedded legend
figure     8-9
moved     8-10
moving     8-9

executive report
about     9-3
components     9-3
definition     1-10, 9-2
figure     9-4

executive summary
about     9-3
component     9-3

F


File menu
Preferences     5-5
Preferences button     5-5

force scan     6-14

full technical report
about     9-5
components     9-5
definition     1-10, 9-2
figure     9-6

G


grid
saving     7-45
toolbar icons     7-47
viewing     7-4

Grid Browser     7-24
about     1-9, 7-2
accessing     7-4
axis combinations     7-11
figure     7-3
swap axes     7-5
tab     5-7

Grid Browser tab
about     5-7
figure     5-8

grid cell
menu options     7-49

grid totals
hiding     7-40, 7-43
showing     7-40, 7-41

grid view
modifying     7-5
zooming     7-24

H


host data
data pivoting     7-18
drilling down     7-13
figure     7-15
showing     7-13

HTML Browser tab
about     5-10
figure     5-11

I


installation     2-2, 3-3

L


legend window
embedding     8-8
hiding     8-6
separating     8-8
showing     8-6

license
corrupted     4-10
expired     4-10
invalid     4-10
one-host evaluation     4-10

license certificate
request     4-4
sample     4-7

License ID number     4-2

license info     5-3

license request
dialog box     4-2
utility     4-1

line chart     8-5

M


main screen
about     5-1
figure     5-2

menu options
main     5-2
pop-up     5-4

Misc tab
about     5-11
figure     5-12

miscellaneous preferences     5-11

N


Names tab     5-6
about     5-6
figure     5-6

Network Addresses tab     6-3
figure     6-3

network mapping     1-6

Network Security Database
See NSDB     10-1

NSDB     10-4
about     1-9, 10-1
accessing     10-3
from Grid Browser     10-3
from main window     10-3
while data pivoting     10-4
entry
about     10-5
figure     10-6
icons     10-7
main screen figure     10-2
severity level     10-8
understanding     10-5
vulnerability list     10-9

nudge
about     B-2
definition     6-2

O


operational solution     1-13

OS rules     B-2

P


pie chart     8-5

ping operation
about     6-14
configuring     6-14

ping retries     6-15

ping timeout     6-15

point products     1-12

Preferences button     5-5

Preferences dialog box
Grid Browser tab     5-7
HTML Browser tab     5-10
Misc tab     5-11
Names tab     5-6
Session Browser tab     5-6

probe
definition     6-2
monitoring status     6-18

process overview     9-5

R


report
brief technical     1-10, 9-2, 9-4
components
about     9-6
cover page     9-3
executive summary     9-3
list     9-6
locations     A-2
process overview     9-5
cover page     9-3
custom     9-2
customizing     A-1
editing     9-20
executive     1-10, 9-2, 9-3
figure     9-17
full technical     1-10, 9-2, 9-5
generating     9-9
printing     9-20
template     A-2
about     A-1
revising     A-2
variables     A-4
viewing     9-18

Report Wizard
about     9-1
figure     9-2

restrictive policies     1-12

result set
about     7-1
menu options     7-48
subfolder     7-2

row percentages
hiding     7-44
showing     7-43

rules
OS     B-2
service     B-2
types     B-1
user     B-2
vulnerability     B-2

S


Sample Session     5-1

scan
definition     6-1
monitoring status     6-18

Scanner
functions     1-4
installation     2-2, 3-3
licensing     4-1
phases     1-4
running
as a service     2-6
as an application     2-5
stopping     2-8, 3-5
uninstalling     2-9, 3-6

Scanner phases
data analysis     1-7
data collection     1-6
data presentation     1-8
network mapping     1-6
reporting     1-10
vulnerability confirmation     1-8

Schedules tab
about     6-5
figure     6-5

Security Wheel
definition     1-13
figure     1-13

service     2-6

service rules     B-2

session
configuration     6-2
creating     6-6
definition     6-1
deleting     6-21
disabling     6-18
modifying     6-20
pausing     6-18
reenabling     6-19
renaming     6-20
scheduling     6-21
stopping     6-19

Session Browser tab
about     5-6
figure     5-7

Session Configuration dialog box
about     6-2
Network Addresses tab     6-3
Schedules tab     6-5
Vulnerabilities tab     6-4

setting preferences     5-5

severity level
definition     10-8
one     10-9
three     10-9
two     10-9
user-defined rules     B-5

showing host data     7-13

stacked bar chart     8-5

swap axes
about     7-5
figure     7-6

system requirements     2-2, 3-2

T


tabs
Grid Browser     5-7
HTML Browser     5-10
Names     5-6
Network Addresses     6-3
Session Browser     5-6

terms     xv

toolbar buttons
grid     7-3
table     5-12

U


uninstalling     2-9, 3-6

user-defined rules
about     B-2
creating     B-6
location     B-3
master syntax     B-4
purpose     B-2
severity level     B-5

V


virtual memory
changing     2-5
requirement     2-2

Vulnerabilities tab
about     6-4
figure     6-4

vulnerability
confirmation     1-8
details     1-2
discovery     1-2
keywords     B-5
list     10-9
rules     B-2

vulnerability keywords
access     B-5
Denial     B-5
Recon     B-5

Z


zoom
about     7-24
button     7-39
in     7-37
out     7-25

zooming     7-24

hometocprevnextglossaryfeedbacksearchhelp
Posted: Thu Jun 29 14:04:15 PDT 2000
Copyright 1989 - 2000©Cisco Systems Inc.