Greenbone Security Manager with Greenbone OS 5 – User Manual¶
This is the manual for the Greenbone Security Manager with Greenbone OS (GOS) version 5. Due to the numerous functional and other differences between GOS 5 and previous versions, this manual should not be used with older versions of GOS.
The Greenbone Security Manager is under constant development. This manual attempts to always document the latest software release. It is, however, possible that latest functionalities have not been captured in this manual.
Should you have additional notes or error corrections for this manual send an e-mail to the Greenbone Networks Support (support@greenbone.net).
The copyright for this manual is held by the company Greenbone Networks GmbH. Greenbone and the Greenbone logo are registered trademarks of Greenbone Networks GmbH. Other logos and registered trademarks used within this manual are the property of their respective owners and are used only for explanatory purposes.
- 1. Introduction
- 2. Read Before Use
- 3. Greenbone Security Manager – Overview
- 4. Guideline for Using the Greenbone Security Manager
- 5. Setting up the Greenbone Security Manager
- 6. Upgrading from GOS 4 to GOS 5
- 7. Managing the Greenbone Operating System
- 7.1. General Information
- 7.2. Setup Menu
- 7.2.1. Managing Users
- 7.2.2. Configuring the Network Settings
- 7.2.2.1. Switching an Interface to Another Namespace
- 7.2.2.2. Configuring Network Interfaces
- 7.2.2.3. Configuring the DNS Server
- 7.2.2.4. Configuring the Global Gateway
- 7.2.2.5. Setting the Host Name and the Domain Name
- 7.2.2.6. Restricting the Management Access
- 7.2.2.7. Displaying the MAC and IP Addresses and the Network Routes
- 7.2.3. Configuring Services
- 7.2.4. Importing a Backup
- 7.2.5. Configuring Periodic Backups
- 7.2.6. Configuring the Feed Synchronization
- 7.2.7. Configuring the GSM as an Airgap Master/Sensor
- 7.2.8. Configuring the Time Synchronization
- 7.2.9. Selecting the Keyboard Layout
- 7.2.10. Configuring Automatic E-Mails
- 7.2.11. Configuring the Collection of Logs
- 7.2.12. Setting the Maintenance Time
- 7.3. Maintenance Menu
- 7.3.1. Performing a Selfcheck
- 7.3.2. Performing a Backup and Restoring a Backup
- 7.3.3. Installing a GOS Upgrade
- 7.3.4. Performing a GOS Upgrade on Sensors
- 7.3.5. Performing a Feed Update
- 7.3.6. Performing a Feed Update on Sensors
- 7.3.7. Upgrading the Flash Partition
- 7.3.8. Shutting down and Rebooting the Appliance
- 7.4. Advanced Menu
- 7.5. Displaying Information about the Appliance
- 8. Getting to Know the Web Interface
- 9. Managing the Web Interface Access
- 10. Scanning a System
- 10.1. Using the Task Wizard for a First Scan
- 10.2. Configuring a Simple Scan Manually
- 10.3. Configuring an Authenticated Scan Using Local Security Checks
- 10.3.1. Advantages and Disadvantages of Authenticated Scans
- 10.3.2. Using Credentials
- 10.3.3. Requirements on Target Systems with Microsoft Windows
- 10.3.4. Requirements on Target Systems with Linux/Unix
- 10.3.5. Requirements on Target Systems with ESXi
- 10.3.6. Requirements on Target Systems with Cisco OS
- 10.4. Configuring a Prognosis Scan
- 10.5. Creating a Container Task
- 10.6. Managing Targets
- 10.7. Creating and Managing Port Lists
- 10.8. Managing Tasks
- 10.9. Configuring and Managing Scan Configurations
- 10.10. Performing a Scheduled Scan
- 10.11. Creating and Managing Scanners
- 10.12. Using Alerts
- 10.13. Obstacles While Scanning
- 11. Reports and Vulnerability Management
- 12. Managing Assets
- 13. Managing SecInfo
- 14. Performing Compliance Scans and Special Scans
- 14.1. Generic Policy Scans
- 14.2. Checking Standard Policies
- 14.3. Running a Mail Server Online Test
- 14.4. Running a TLS-Map Scan
- 14.5. Running an OVAL System Characteristics Scan
- 14.6. Running a Policy Control Scan
- 15. Using the Greenbone Management Protocol
- 16. Using a Master-Sensor Setup
- 17. Managing the Performance
- 18. Connecting the Greenbone Security Manager to Other Systems
- 19. Architecture
- 20. Frequently Asked Questions
- 20.1. Why is the Scanning Process so Slow?
- 20.2. Why Is a Vulnerability Not Detected?
- 20.3. Why Does the Scan Trigger Alarms on Other Security Tools?
- 20.4. Why Does a VNC Dialog Appear on the Scanned Target System?
- 20.5. How Can a Factory Reset of the GSM Be Performed?
- 20.6. Why Does Neither Feed Update nor GOS Upgrade Work After a Factory Reset?
- 20.7. What Can Be Done if the GOS Administration Menu Is not Displayed Correctly in PuTTY?
- 20.8. How Can the GMP Status Be Checked Without Using Credentials?
- 21. Glossary
- 21.1. Alert
- 21.2. Asset
- 21.3. CERT-Bund Advisory
- 21.4. CPE
- 21.5. CVE
- 21.6. CVSS
- 21.7. DFN-CERT Advisory
- 21.8. Filter
- 21.9. Group
- 21.10. Host
- 21.11. Note
- 21.12. Network Vulnerability Test (NVT)
- 21.13. OVAL Definition
- 21.14. Override
- 21.15. Permission
- 21.16. Port List
- 21.17. Quality of Detection (QoD)
- 21.18. Remediation Ticket
- 21.19. Report
- 21.20. Report Format
- 21.21. Result
- 21.22. Role
- 21.23. Scan
- 21.24. Scanner
- 21.25. Scan Configuration
- 21.26. Schedule
- 21.27. Severity
- 21.28. Solution Type
- 21.29. Tag
- 21.30. Target
- 21.31. Task