Does anyone have any sort of documented workflow on the steps you take when
doing say a quarterly vulnerability assessment of your network using OpenVAS?
It would just benefit me no end to see for a typical windows network "where you
start", when doing your audits i.e. there must be some logic workflow behind
scanning certain hosts before others. Is there any sort of 1-10 type workflow
you follow when doing the audits? i.e.
1) Configure this (first)
2) Configure this (second)
3) Scan this area (first)
4) Scan this area (second)
5) Etc
Or is this overkill, does the order of what you scan first make no real
difference? If you do follow a documented workflow is there any chance you
could share the document?if there isn't such a doc out there would anyone be
willing to help put one together? Thanks
Sent using BlackBerry® from Orange
_______________________________________________
Openvas-discuss mailing list
[email protected]
http://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss