04.03.2013 Views

OfficeScan 10.6 Administrator's Guide - Trend Micro™ Online Help

OfficeScan 10.6 Administrator's Guide - Trend Micro™ Online Help

OfficeScan 10.6 Administrator's Guide - Trend Micro™ Online Help

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

3. Type the IP address range of the computers you want to check.<br />

a. Type an IPv4 address range.<br />

Installing the <strong>OfficeScan</strong> Client<br />

Note: Vulnerability Scanner can only query an IPv4 address range if it runs on a<br />

pure IPv4 or dual-stack host machine.<br />

Vulnerability Scanner only supports a class B IP address range, for<br />

example, 168.212.1.1 to 168.212.254.254.<br />

b. For an IPv6 address range, type the IPv6 prefix and length.<br />

Note: Vulnerability Scanner can only query an IPv6 address range if it runs on a<br />

pure IPv6 or dual-stack host machine.<br />

4. Click Settings. The Settings screen appears.<br />

5. Configure the following settings:<br />

a. Ping settings: Vulnerability Scan can "ping" the IP addresses specified in the<br />

previous step to check if they are currently in use. If a target host machine is<br />

using an IP address, Vulnerability Scanner can determine the host machine’s<br />

operating system. For details, see Ping Settings on page 4-52.<br />

b. Method for retrieving computer descriptions: For host machines that<br />

respond to the "ping" command, Vulnerability Scanner can retrieve additional<br />

information about the host machines. For details, see Method for Retrieving<br />

Computer Descriptions on page 4-50.<br />

c. Product query: Vulnerability Scanner can check for the presence of security<br />

software on the target host machines. For details, see Product Query on page<br />

4-46.<br />

4-39

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!