4. Guideline for Using the Greenbone Security Manager

The following steps are fundamental in using the Greenbone Security Manager (GSM):

  • Setting up the GSM → Chapter 5
  • Upgrading the Greenbone operating system (GOS) → Chapter 6 and Chapter 7.3.3
  • Performing a scan → Chapter 10
  • Reading and using a report → Chapter 11.2.1
  • Using notes to manage the results → Chapter 11.7
  • Using overrides to manage false positives → Chapter 11.8

The following steps are more advanced:

  • Setting up a central authentication using LDAP → Chapter 9.5
  • Connecting verinice to the GSM → Chapter 18.2
  • Connecting Nagios to the GSM → Chapter 18.3