I don’t think you can make a change to a scan config once it has been used.  I 
believe you’ll have to clone the scan and make your changes to the clone.  
Then, assign the cloned and edited scan config as appropriate.

J
This message was classified PUBLIC by CAMPBELL Jeremy on Tuesday, September 5, 
2017 at 1:32:08 PM.

From: Openvas-discuss [mailto:[email protected]] On 
Behalf Of Neeraj Shah
Sent: Tuesday, September 5, 2017 12:07 PM
To: [email protected]
Subject: [Openvas-discuss] Edit scan config options grayed out

Hello,

I am using OpenVAS 9. I am facing an issue with my scans for an entire subnet 
running very slow.   I found a post online from a user recommending the below 
option to resolve this slow scan issue:


Create a new config based on "full and fast". Edit this config. Set
"Network Vulnerability Test Preferences" -> "Ping Host" ->
"Mark unrechable Hosts as dead" to "yes".

However, when i create my new config >> Select "Full & Fast" >> Edit this 
config >> Expand the option of "Network Vulnerability Test Preferences" -> 
"Ping Host" ->   All these options are read-only & thus cannot be edited.

I am logged in to the GSA gui as the admin user.

As per the documentation, If i further click on the NVT Family Name : "Ping 
HOST" , it opens a new page which shows some basic information about the NVT .  
There is no option here to EDIT or make any changes to the PING HOST family.

How do i  "mark unreachable hosts as dead" to YES ?




Thanks

Neeraj

________________________________

This message, including attachments, is intended for the above-mentioned 
addressees only. It may contain confidential information the review, 
dissemination or disclosure of which is strictly prohibited. Should you receive 
this message in error, please delete it and notify the sender to the e-mail 
address indicated above.

________________________________
_______________________________________________
Openvas-discuss mailing list
[email protected]
https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss

Reply via email to