Examples of using Nvts in English and their translations into German
{-}
-
Colloquial
-
Official
-
Ecclesiastic
-
Medicine
-
Financial
-
Ecclesiastic
-
Political
-
Computer
-
Programming
-
Official/political
-
Political
Now all NVTs are used and executed in a scan configuration.
This setting disables those respective NVTs.
The local security check NVTs in the resulting scan are minimally invasive.
A sensor does not store any information permanently except for NVTs.
This script creates a new scan config with nvts based on a given CERT-Bund Advisory.
This ensures that new NVTs are available immediately and without any interaction by the administrator.
Info This role(Information Browser)has only read access to the NVTs and SCAP information.
In the policy section of the NVTs database at least two of these four policy NVTs are required to run a policy scan.
Mark unreachable Hosts as dead: This defines whether a host that is not discovered by thisNVT should be tested by other NVTs later.
In the policy section of the NVTs database at least two of these four policy NVTs are required to run a policy scan.
This scan configuration expands the scan configuration Full andvery deep with dangerous NVTs that could cause possible service or system disruptions.
Place all NVTs(*. nasl files) and NASL libraries(*. inc files) in the respective directory here/home/my-nvt-feed.
When performing policy scans, there are groups of four NVTs in the NVT family Policy that can be configured accordingly.
In the past, these NVTs had a default severity of 0(log message) and overrides were required for different severities.
Mark unreachable Hosts as dead: Here it can be selected if a system that are not discovered by thisNVT should be tested by other NVTs later. Default: No.
In the past these NVTs had a default score of 0(log message) and overrides were required for different scores.
In the section Edit Network Vulnerability Test Families activate the checkboxes in the column Select all NVTs if all NVTs of a family should be activated.
In the past these NVTs had a score of 0 and overrides were required see section Severity, Severity, Severity, etc.
The information about whether a certain product is present on the target system is gathered by a single Network Vulnerability Test(NVT)or even independently by a number of special NVTs.
All NVTs with very invasive components or which may trigger a denial of service(DoS) are automatically excluded from the test.
Comparison, weighting and prioritisation of any scan results or NVTs is possible because the severity concept is strictly applied across the entire system.
The NVTs in the corresponding NVT families(local security checks) will only be executed if the GSM was able to log into the target system.
This prevents that overrides may not be applied when NVTs are updated. Furthermore, the New Severity is not anymore just a threat level but rather a CVSS value.
If more NVTs run simultaneously on a system or more systems are scanned at the same time, the scan may have a negative impact on either the performance of the scanned systems, the network or the GSM appliance itself.
Scan configurations that are configured dynamically will include and activate new NVT families andnew NVTs of the respective activated families automatically after a NVT Feed update.
If more NVTs run simultaneously on a system or more systems are scanned at the same time, there is the danger that a scan has a negative impact on the performance of the systems or network.
This essentially means that if it should be sure the desired product indeed runs as a service,running NVTs that check for the simple presence on the file system or in a registry should be avoided.
An overview on the detected ports is already provided by other NVTs as log information. Additionally the new user interface even offers a explicit tabular overview in identified ports as part of the new report browser.
The SecInfo dashboard is reached by clicking SecInfo>Dashboard in the menu bar. The SecInfo dashboards displays the NVTs, CVEs and CERT Bund advisories by their corresponding severity class. Additionally, it displays both CVEs and CERT Bund advisories by their creation time.