04-25-2009 03:04 AM - edited 03-09-2019 10:14 PM
We have over 100 networks, with 1 to 2 servers with CSA 5.2 on them in each network. We stagger vulnerability scans on each network quarterly. Is there a way, to remove or filter the alerts for the IP address that scans these networks?
I've attempted to create a Network Access Control rule, inside a rule module, associated to a policy, associated to a group with all CSA servers included. I have also attempted to add that policy to all of the policies that are enforced on our agents. Neither of these sollutions worked.
Any suggestions would be greatly appreciated. Thank you in advance.
04-27-2009 04:00 PM
Add your IPs to the built in Network Address variable "Authorized Port Scanners" and it should allow scanning from those IPs.
By default it only has 0.0.0.0 as an authorized scanner address.
Tom
04-29-2009 10:44 PM
Thanks for replying Tom. I have the IP address of my scanner in that variable, but it seems to only work for network shield rules. The majority of the servers we have CSA on are IIS/Apache servers. So rules in the Common Web Server Security Module [W] still fire.
I've been banging my head against the wall on this, and I'm not sure it can even be done with CSA. Considering the rules that still fire do not seem to track the source IP address, I think I'm expecting the impossible.
04-30-2009 02:56 PM
Which rules are firing?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide