Looking for any documentation concerning the checks that are turned on for the subject policies. As to why or why not certain checks are turned on, what they are looking for, etc.? Any real world experience? I know the help file states to watch scanning routers/switches as they are tempermental. I notice a TCP port scan isn't even done. For example, the BackDoorLeapFrog exploit is turned on in the L4 policy, but the platforms affected are Windows 2000, Linux, BSD, Windows: 95, Windows NT, Solaris: 2.6, Windows: 98. No routers or switches mentioned. There are several checks like this that don't seem to fit. Any info anyone has is appreciated. If anyone has experience with Juniper Routers and IS scanning info would help too... thanks v/r
Mark P. Evans _______________________________________________ ISSForum mailing list [EMAIL PROTECTED]
