28.06.2014 Views

CyberCop Scanner Getting Started Guide

CyberCop Scanner Getting Started Guide

CyberCop Scanner Getting Started Guide

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>CyberCop</strong> <strong>Scanner</strong> in Active Security<br />

Your Security Policy<br />

(You decide what is important<br />

and how to respond)<br />

McAfee<br />

HelpDesk<br />

Gauntlet<br />

Firewall<br />

<strong>CyberCop</strong><br />

<strong>Scanner</strong><br />

(Proactively scanning<br />

internal network<br />

for vulnerabilities)<br />

Event Orchestrator<br />

(Accepts all alerts, compares<br />

with security policy, then<br />

initiates responses)<br />

Administrator<br />

alerts<br />

Figure 1-2. The Active Security suite.<br />

The above figure illustrates the following principles:<br />

• Your network security policy determines everything Active Security does.<br />

• Your network administrator runs one or more copies of <strong>CyberCop</strong> <strong>Scanner</strong> to<br />

examine your network for vulnerabilities.<br />

• One or more copies of Event Orchestrator listen to <strong>CyberCop</strong> <strong>Scanner</strong> and, when<br />

vulnerabilities are detected, automatically dispatch your custom predetermined<br />

responses — which may involve sending an alert to the administrator or running<br />

a Visual Basic script.<br />

• Some responses can be delegated to external actors, including Gauntlet Firewall<br />

and McAfee HelpDesk.<br />

The two remaining Active Security components, the Net Tools PKI Server and the<br />

Active Security Setup Panel, aren’t sensors, arbiters, or actors. Instead, they support<br />

the sensors, arbiters, and actor components by making it possible for them to<br />

communicate securely.<br />

IMPORTANT: The purpose of Active Security is to implement your network<br />

security policy. Do not activate any of the Active Security features until you<br />

have formulated a network security policy.<br />

<strong>CyberCop</strong> <strong>Scanner</strong> <strong>Getting</strong> <strong>Started</strong> <strong>Guide</strong> 1-5

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!