Index

A | B | C | D | E | F | G | H | I | L | M | N | O | P | Q | R | S | T | U | V | W

A

advisory
Airgap
Airgap FTP server
Airgap USB stick
Alert, [1]
Alerts, [1]
Alive Test, [1]
Architecture
Asset
Assets dashboard
Authenticated scan
Auto-refresh

B

Backup, [1]
Blackbox
BSI, [1], [2], [3], [4], [5]
BSI TR-03116

C

CERT-Bund
CERT-Bund Advisory
Certificate, [1]
Charts
Ciphers
Cisco Firepower
COBIT
Common Platform Enumeration
(CPE)
Common Vulnerabilities and Exposures (CVE)
Common Vulnerability Scoring System
(CVSS)
Community Edition, [1]
Container Task
Container task
Control Objectives for Information and Related Technology
Copyright file
CPE, [1]
CVE
CVE scanner
CVSS

D

Dashboards
DFN
DFN-CERT, [1]
DFN-CERT Advisory
DHCP, [1]
DNS, [1], [2]
DNS server
domain name

E

E-Mail alerts
eth0

F

False Positive
Feed, [1], [2]
Feed status
Feed update
Feed update on sensors
File checksums
File content
Filter, [1]
Firepower Management Center

G

Global gateway
GMP, [1], [2], [3], [4], [5], [6]
GOS Admin Menu
(selected)
*, [1]
About, [1], [2], [3], [4], [5], [6], [7], [8], [9], [10], [11], [12], [13], [14], [15], [16], [17], [18], [19], [20], [21], [22]
Add a new route
Add a new sensor
Admin Key
Admin User, [1], [2]
Advanced, [1], [2], [3], [4], [5], [6], [7], [8]
Airgap Master, [1]
Airgap Slave
Authentication
Auto
Backup, [1], [2], [3], [4], [5], [6]
Backup Location
CSR
Certificate, [1], [2], [3]
Certificates, [1], [2]
Change Password, [1]
Ciphers
Cleanup
Client
Complex
Configuration > Targets
Configure IPv4 Routes, [1]
Configure IPv6 Routes, [1]
Configure Master
Configure Namespaces
Configure a new VLAN interface
Configure the Routes for this interface, [1]
Configure the VLAN interface ...
Configure the VLAN interfaces on this interface, [1]
Contact
Continue, [1], [2]
Copyright
DHCP
DNS
Data import
Delete Account, [1]
Delete Update Key
Domainname
Download, [1], [2], [3]
Enable Guest
Engine ID
Enter, [1], [2]
FTP Master
FTP Master Location
FTP Master Password
FTP Master Test
FTP Master User
Feed, [1], [2], [3], [4], [5], [6], [7], [8], [9], [10], [11], [12], [13], [14]
Fingerprint, [1]
Fingerprints, [1]
Flash, [1], [2]
Full Remote
Full Syslog
GMP, [1]
GMP-State
Generate, [1]
Global Gateway
Global Gateway (IPv6)
Greenbone Server, [1]
Guest User
HTTPS, [1], [2], [3], [4], [5]
Hostname
IP
Incremental Backup
Interfaces
Key(Editor)
Key(HTTP)
Keyboard
Length
List
List Users
Location
Login Attempts
Login Protection, [1]
Logs
MAC
MTU
Mail, [1], [2]
Maintenance, [1], [2], [3], [4], [5], [6], [7], [8], [9], [10], [11], [12], [13], [14], [15], [16], [17], [18]
Management IP (v4)
Management IP (v6)
Master, [1]
Master Identifier
Max include
Max size
Namespace: Management, [1], [2]
Network, [1], [2], [3], [4], [5], [6]
New Update Key (Editor), [1], [2], [3]
New Update Key (HTTP), [1], [2], [3]
No, [1]
OK, [1], [2], [3], [4], [5], [6], [7], [8]
PKCS#12
Password
Password Policy, [1]
Periodic Backup
Port
Port 9393
Power, [1]
Privacy
Reboot, [1], [2], [3], [4]
Remote Syslog, [1], [2]
Restore
Routes
SNMP, [1]
SSH, [1], [2]
SSH State, [1]
Save, [1], [2], [3], [4], [5], [6], [7], [8], [9], [10], [11], [12], [13], [14], [15], [16], [17], [18]
Scans > Tasks
Security Remote
Security Syslog
Selfcheck
Sensor, [1], [2]
Sensor Identifier
Sensors, [1], [2], [3], [4], [5], [6]
Server
Server key
Services, [1], [2], [3], [4], [5], [6], [7], [8], [9], [10], [11]
Setup, [1], [2], [3], [4], [5], [6], [7], [8], [9], [10], [11], [12], [13], [14], [15], [16], [17], [18], [19], [20], [21], [22], [23], [24], [25], [26], [27], [28], [29], [30], [31], [32], [33], [34], [35], [36], [37], [38], [39], [40], [41], [42], [43], [44], [45], [46], [47], [48], [49], [50]
Shell
Show
Shutdown
Static IP
Subscription
Super Admin, [1]
Superuser
Superuser State
Support, [1], [2]
Support Package
Switch Release, [1]
Sync
Sync port
Sync proxy
Synchronisation, [1], [2]
Temporary HTTP
Test, [1]
Time
Time synchronisation
Timeout
Timesync
USB Backup, [1]
USB Master
Update, [1], [2]
Upgrade, [1], [2], [3], [4], [5], [6]
Upload
User, [1], [2], [3], [4], [5], [6]
User key
Username, [1]
Users, [1], [2], [3], [4], [5], [6]
Write
Yes, [1], [2], [3], [4], [5], [6], [7], [8], [9], [10], [11], [12], [13], [14], [15], [16], [17]
eth0
scan1, [1], [2]
GOS Commands
check-gmp.gmp, [1]
grep
gvm-cli, [1]
gvm-cli.exe
gvm-pyshell, [1], [2]
gvm-pyshell.exe, [1]
gvm-script, [1], [2]
gvm-tools
snmpwalk
GOS WebUI
"
$s, [1], [2]
%T
-
121h
192.168.0.1, [1]
192.168.0.100
3
5d1h
:RegEx
<
=, [1]
>
Action > New > Group
Actions, [1], [2]
Active, [1], [2], [3]
Add, [1]
Add Group
Add Key
Add Permission...
Add User or Group, [1]
Add results to Assets
Admin
Administration
Administration > Groups
Administration > LDAP
Administration > Radius
Administration > Roles, [1], [2], [3], [4], [5]
Administration > Users, [1], [2]
Advanced
Advanced Task Wizard
Alemba vFire
Alerts, [1], [2]
Alive Test, [1]
All TCP
Allow
America/New York
Any
Appliance settings
Apply to
Assets > Dashboard, [1]
Assets > Hosts, [1], [2]
Assets > Hosts (Classic)
Assets > Operating Systems
Assets GSM-Scans
Auth. DN, [1]
BSI Model
BSI-TR-03116-4 Policy
Back, [1]
Berichtformat, [1]
Browse
Browse..., [1], [2], [3], [4], [5], [6], [7], [8], [9], [10], [11], [12], [13], [14], [15], [16], [17], [18], [19], [20], [21], [22], [23], [24], [25], [26], [27], [28], [29], [30]
Bufferoverflow
CERT-Bund Advisories, [1], [2]
CERT-Bund Advisory, [1], [2]
CLASSES_ROOT
CPE Policy Check – Single CPE
CPE Policy Check — Single CPE
CPE-based Policy Check Violations
CVE
Change Permissions
Changed
Character set
Check Names, [1], [2]
Check for, [1]
Click to select files or drag/drop, [1]
Client Certificate
Clone
Column type
Compliance, [1]
Compliance Tests, [1], [2], [3]
Computer Configuration > Policies > Windows Settings > Security Settings
Computer Configuration > Policies > Windows Settings > Security Settings > Local Policies > User Rights Assignment, [1]
Configuration > Alerts, [1], [2], [3]
Configuration > Credentials, [1], [2], [3], [4], [5], [6]
Configuration > Filters, [1]
Configuration > Permissions, [1], [2], [3]
Configuration > Port Lists, [1], [2], [3]
Configuration > Report Formats, [1], [2], [3], [4]
Configuration > Scan Configs, [1], [2], [3], [4], [5], [6], [7], [8]
Configuration > Scan Configuration
Configuration > Scanners, [1]
Configuration > Schedules
Configuration > Tags
Configuration > Targets, [1], [2], [3], [4], [5]
Configurations > Scan Configs, [1], [2], [3]
Configurations > Targets, [1]
Configure this key then
Consider Alive
Container Task
Content
Controls GSM-Scans
Create, [1], [2], [3], [4], [5], [6], [7], [8], [9], [10], [11], [12], [13], [14], [15], [16], [17], [18], [19], [20], [21], [22], [23], [24], [25], [26], [27], [28], [29], [30], [31], [32], [33], [34], [35], [36], [37], [38], [39], [40], [41], [42], [43], [44], [45], [46], [47], [48], [49], [50], [51], [52], [53]
Create / Register VM, [1]
Create Link
Create Permission
Create Subkey
Credentials, [1], [2]
Dashboard
Define these policy settings, [1]
Delete
Deny
Deny log on locally
Deny log on through Desktop Services
Deploy a virtual machine from an OVF or OVA file, [1]
Do not automatically delete reports
Done, [1], [2], [3], [4], [5], [6], [7], [8]
Download, [1], [2]
Dynamic Severity
Edit, [1], [2]
Edit Network Vulnerability Test Families, [1], [2], [3], [4], [5], [6], [7]
Edit Role...
Edit Scanner Preferences, [1]
Email report to, [1]
Empty Trashcan
Empty, static and fast
Enable, [1]
Extras > CVSS Calculator
Extras > Feed Status
Extras > My Settings
Extras > Performance
Extras > Trashcan
Families/Total
File > Import Appliance
File Checksum: Errors
File Checksum: Violations
File Checksums
File Content
File Content: Errors
File Content: Violations
Filter, [1], [2], [3]
Filters
Fingerprint
Finish, [1]
Full and Fast, [1], [2], [3], [4], [5], [6]
Full and fast, [1]
GMP Scanner
General Command Permissions
Global, [1]
Gone, [1]
Grant
GrantReadPriv
Greenbone Local SecRights, [1], [2], [3]
Greenbone: Automatic Base Security Check
Greenbone: Automatically assign components
Greenbone: Start Vulnerability Tracking
Group, [1]
Group Policy Management
Group Policy Objects
Group Policy objects
Group Scope
Group Type
Group with Tags..., [1]
Groups, [1], [2]
High, [1], [2]
Host, [1], [2], [3]
Host Access, [1]
Hosts, [1], [2], [3], [4], [5]
Hosts/Manual
ID, [1]
IT-Grundschutz, 15. EL, [1]
IT-Grundschutz, Kompendium, [1]
ITG
Import
Information Security Model
Interface Access
Inventory > Inventory
LDAP Authentication Only, [1]
LDAP Host
LDAP host
Launch IT-Grundschutz (15. EL)
Launch latest IT-Grundschutz version
Level of Security (IT-Grundschutz)
Link an Existing GPO
Link an Existing GPO...
Location, [1], [2], [3]
Log, [1], [2], [3], [4], [5]
Login Name
Low, [1], [2]
MACHINE
Medium, [1], [2]
Method, [1], [2]
Modify Task Wizard
My Settings
NVT, [1], [2]
NVT OID
NVTs, [1], [2]
NVTs/Total
Name, [1], [2], [3], [4], [5], [6], [7], [8], [9], [10], [11], [12], [13], [14], [15], [16]
Navigator, [1]
Network
Network Source Interface
Network Vulnerability Test Families
Network Vulnerability Test Preferences, [1], [2]
New, [1], [2], [3], [4]
New Container Task
New Permission
New Severity, [1]
New Task, [1], [2], [3], [4], [5], [6], [7], [8], [9]
Next, [1], [2], [3], [4], [5], [6], [7], [8], [9]
No
None
OK, [1], [2], [3], [4], [5], [6], [7], [8], [9], [10], [11], [12], [13], [14], [15], [16], [17]
OVAL-SC
OVAL-SC Archive
Other
Overflow
Paranoid
Partial CVE match
Password, [1], [2], [3]
Perform check
Permissions, [1], [2], [3], [4], [5], [6], [7]
Ping Host
Policy, [1], [2], [3], [4], [5], [6], [7], [8], [9], [10]
Port List, [1]
Port Ranges — Manual
Port Scanner
Power on, [1]
Propagate inheritable permissions to all subkeys
QoD, [1], [2]
RADIUS Authentication Only, [1]
RADIUS Host
ReadOnly
Reboot, [1]
Registry
Registry Content: Errors
Registry Content: Violations
Relations
Rename
Replace existing file with, [1], [2], [3]
Report, [1]
Report Format
Report Formats, [1], [2], [3]
Report: Results, [1], [2], [3], [4], [5], [6], [7], [8]
Report: Summary and Download, [1], [2], [3], [4], [5], [6]
Reports, [1]
Reports/Last
Reports/Total, [1]
Reports: Summary and Download
Restricted Groups
Role
Roles, [1], [2], [3], [4]
Roles (optional)
Router-advertisement
Run Alert
SMB
SSH, [1]
Same, [1]
Save, [1], [2], [3], [4], [5], [6], [7], [8], [9], [10], [11], [12], [13], [14], [15], [16], [17], [18], [19], [20], [21], [22], [23], [24], [25], [26], [27], [28], [29], [30], [31], [32], [33], [34], [35], [36], [37], [38], [39], [40], [41], [42], [43], [44], [45], [46], [47], [48], [49], [50], [51], [52], [53], [54], [55]
Scan Configs, [1], [2], [3], [4], [5], [6], [7], [8], [9], [10], [11]
Scanner
Scanner Preferences
Scanners
Scans > Dashboard
Scans > Notes
Scans > Overrides
Scans > Reports, [1], [2], [3], [4], [5], [6], [7], [8], [9], [10], [11], [12], [13], [14], [15], [16], [17]
Scans > Results
Scans > Tasks, [1], [2], [3], [4], [5], [6], [7], [8], [9], [10], [11], [12], [13], [14], [15], [16], [17], [18], [19], [20], [21], [22], [23], [24], [25], [26], [27]
SecInfo
SecInfo > CERT-Bund Advisories
SecInfo > CPEs
SecInfo > CVEs
SecInfo > DFN-CERT Advisories
SecInfo > Dashboard
SecInfo > NVTs
SecInfo > OVAL Definitions
SecInfo Management
Secret Key
Security
Select all NVTs
Select file..., [1]
Send to host, [1]
Separated by
Services
Set Value
Settings, [1], [2]
Settings > Data Inputs > TCP
Settings > Data inputs > TCP
Setup, [1], [2], [3]
Severity, [1], [2]
Severity (Class), [1], [2], [3]
Single CPE, [1], [2]
Solution type, [1]
Sourcefire Connector
Splunk Connector
Start
Start Scan
Status, [1], [2]
Super (Has super access)
Super Admin, [1]
System > Acceleration
TLS Map
Tags
Take Ownership
Targets
Task
Task Wizard
Tasks, [1], [2], [3], [4], [5], [6], [7], [8], [9]
Term
Text
Text delimiter
This group is member of
This object and child objects
Tools
Trashcan
Trust (Last Verified), [1]
Type, [1]
USERS
Unicode (UTF-8)
Update, [1], [2], [3], [4]
Updated, [1], [2]
Upload, [1], [2], [3], [4], [5], [6], [7], [8]
Upload file, [1], [2], [3], [4]
User, [1], [2]
User Tags
Username
Username + Password
Username + SSH Key, [1], [2]
Users, [1], [2], [3]
Virtual Machines, [1]
Vulnerability, [1], [2], [3], [4], [5]
Windows Registry Check
Windows file Checksums
XML
Yes, [1], [2], [3], [4], [5], [6], [7], [8]
alerts
cn
configuration > Permissions
created<-1w
created>-1w
created>-5d
created>2014-05-26
d
exploit
first, [1], [2]
general/IT-Grundschutz
general/IT-Grundschutz-T
get_users (Has read access to users)
h
list
localhost ssh-rsa AAAAB3NzaC1y...P3pCquVb
m, [1]
missing
name:admin$
name~admin
on port
ou=people,dc=domain,dc=de
overflow
port_list
present
proxy, [1], [2], [3], [4]
read, [1]
remote
resume_task
rows, [1], [2]
rows=10, [1]
s
safe checks
sort=name
start_task
stop_task
task
test_alert
uid
verify_agent
verify_report_format
verify_scanner
w
y
yes, [1], [2]
~
Greenbone Management Protocol, [1]
Greenbone Security Explorer
Greenbone Security Feed
Group
Groups
GSM 150
GSM 25V, [1]
GSM 35
GSM 400
GSM 5400
GSM 600
GSM 650
GSM 6500
GSM MAVEN
GSM ONE
Guest

H

Host
host name
HTTP proxy
HTTP-Proxy
HTTPS

I

Icons
Information Systems Audit and Control Association
International Organization for Standardization
IP address
IPS
IPv6
ISACA
ISMS
ISO
ISO 27000
ISO 27001
ISO 27005
IT Grundschutz
IT security management
IT-Grundschutz, [1]
IT-Grundschutz catalogs

L

Large Enterprise Class
LDAP, [1], [2], [3]
LDAPS
Local security checks
local security checks, [1], [2], [3]
Logging into the web interface, [1], [2], [3], [4]

M

MAC address
mailhub
Main dashboard
Management IP address
maxchecks
maxhosts
Medium Enterprise Class
migration
MITRE
MTU

N

Nagios
NASL wrapper
Network Intrusion Detection System
Network Time Protocol
Network Vulnerability Test
(NVT)
NIDS
Nmap
Note
Notes
NTP, [1]
NVT, [1], [2], [3]
NVT-Family

O

OMP Commands
create_target, [1]
Open Scanner Protocol
Open Vulnerability and Assessment Language
OSP
OVAL
OVAL Definition, [1]
Override, [1]

P

PCI DSS, [1]
Permission
Permissions
authenticate
get_alerts
get_configs
get_filters
get_groups
get_notes
get_overrides
get_roles
get_schedules
get_settings
get_tags
get_targets
get_tasks
get_users, [1], [2]
write_settings
Ping
Port list
port list
Powerfilter
first
rows
sort
sort-reverse
tag
powerfilter
Preferences
Base
Data length
Do a TCP ping, [1]
Do an ICMP ping
Do not randomize the order in which ports are scanned
Do not scan targets not in the file, [1]
Errors
File Checksums
File Checksums: Errors
File Checksums: Matches
File Checksums: Violations
File Content
File Content: Errors
File Content: Matches
File Content: Violations
File containing grepable results, [1]
Fragment IP packets
Host Timeout
Identify the remote OS
Initial RTT timeout
Mark unreachable Hosts as dead
Matches
Max RTT timeout
Max Retries
Maximum wait between probes
Min RTT Timeout
Min RTT timeout
Minimum wait between probes
Ports scanned in parallel (max)
Ports scanned in parallel (min)
RPC port scan
Report about reachable Hosts
Report about unreachable Hosts
Run dangerous ports even if safe checks are set
Service scan
Source port
TCP ping tries also TCP-SYN ping
TCP scanning technique
Timing policy
Use ARP
Use Nmap
Use hidden option to identify the remote OS
Violations
Windows Registry Check
Windows Registry Check: Errors
Windows Registry Check: OK
Windows Registry Check: Violations
auto_enable_dependencies
cgi_path
checks_read_timeout
drop_privileges
max_sysload
min_free_mem
network_scan
nmap additional ports for –PA
nmap: try also with only –sP
non_simult_ports
optimize_test
plugins_timeout
report_host_details
safe_checks, [1]
scanner_plugins_timeout
time_between_request
timeout_retry
unscanned_closed
unscanned_closed_udp
use_mac_addr
vhosts, [1], [2], [3]
vhosts_ip, [1], [2], [3]
Prognosis, [1]
Protocols

Q

QoD, [1]
QoD types
Quality of Detection
(QoD)

R

RADIUS, [1], [2]
Reboot
Registry Content
rehash.exe
Report
Report Format
Report format
Result
Role
Roles
Admin, [1]
Guest, [1], [2]
Info, [1], [2]
Monitor, [1]
Observer, [1]
Super Admin
User, [1], [2]
Routes, [1]

S

Scan
scan administrator
Scan Config
Scan configuration
Scan dashboard
Scanner, [1]
Schedule
SCP
SecInfo Dashboard
Selfcheck
Severity
Severity class
Shell
Shutdown
smart host
SME/SMB Class
SMTP
SNMP, [1], [2], [3], [4], [5], [6], [7], [8], [9]
SNMP trap
Solution Type
Solution type
Sourcefire
Splunk, [1]
SSH, [1], [2]
SSH Fingerprint
Starting the appliance, [1], [2], [3]
Static IP address
Status Codes
Subscription key
Super Admin
Superuser
Support
Support package, [1]
Syslog, [1], [2]

T

Tag
Tags
Target
Task
Temporary HTTP server
TippingPoint SMS
TLS
Trend, [1]

U

Upgrade
Upgrading Sensors
User Management
User Settings
Details Export File Name
Filter
List Export File Name
Password
Report Export File Name
Rows Per Page, [1]
Severity Class
Timezone
User Interface Language
Wizard Rows

V

Verinice
verinice.PRO
Virtual sensor
VirtualBox
VLAN
VMware, [1], [2], [3]

W

web administrator
Web interface
Whitebox