New and updated features in the current release of the software are described below:
The web application scanner provides a scan configuration, vulnerability checks, and scan reports for web applications. Using a web application scan configuration, you can set the entry URL, paths to include or exclude, and parameters to exclude during a web application scan.
The web application scanner searches for vulnerabilities and weaknesses in the web code that could lead to an exploit. For example, web sites that have forms that require users to enter information or use databases as back-end repositories may be directly exploited through mechanisms such as SQL injection, where a URL request with specific text could allow direct access to the SQL database.
The web application scanner requires the appropriate license.
The Remediation feature in McAfee Vulnerability Manager is now Ticketing. Ticketing is a more accurate description of this feature. Tickets can be viewed by asset, by vulnerability, by user, or view all tickets. The Ticketing feature also has a Ticket Summary email that will send an email with summary information about all the tickets that have changed for that user.
The scan controller provides the communication between the scan engine and the database. If you have multiple scan engines running simultaneous scans, you might need multiple scan controllers.
When configuring a scan and scheduling a time, you can select to use the timezone of the scan engine or select a local timezone.
The license usage manager shows the valid dates for your license, license usage (license allowance, active IP address usage, and web application usage), licensed IP ranges, and the McAfee Vulnerability Manager components the user is licensed to use.
By adding the web application scanner, McAfee Vulnerability Manager can scan for SQL injection and cross-site scripting vulnerabilities.
The PCI reports have been updated to be PCI DSS compliant. PCI reports include sorting vulnerabilities by CVSS score, scan configuration and scan summary sections, and a false-positive appendix.
In previous releases, SSH key collection was done using the configuration manager. Now SSH key collection is part of a scan configuration. When creating a scan configuration, on the Settings tab, under Optimize, there is a Perform SSH Key Collection checkbox. Selecting this option means while scanning, McAfee Vulnerability Manager will collect the SSH keys that are available on the scan targets. After the SSH keys are collected, you can then go to the asset management page and mark the asset as trusted.
Issues from previous releases of the software that are resolved in this release are listed below.
When importing IP addresses from a text file into a scan configuration, any IP address using the CIDR format (i.e. 184.108.40.206/24) will cause an error and the IP addresses will not be imported.
Importing CIDR formatted IP addresses from a text file into a scan configuration functions properly.
McAfee provides the information you need during each phase of product implementation, from installing to using and troubleshooting. After a product is released, information about the product is entered into the McAfee online KnowledgeBase.
For option definitions, click ? in the interface.
|For user documentation||For the KnowledgeBase|
Copyright © 2010 McAfee, Inc. All Rights Reserved.
No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of McAfee, Inc., or its suppliers or affiliate companies.
AVERT, EPO, EPOLICY ORCHESTRATOR, FLASHBOX, FOUNDSTONE, GROUPSHIELD, HERCULES, INTRUSHIELD, INTRUSION INTELLIGENCE, LINUXSHIELD, MANAGED MAIL PROTECTION, MAX (MCAFEE SECURITYALLIANCE EXCHANGE), MCAFEE, MCAFEE.COM, NETSHIELD, PORTALSHIELD, PREVENTSYS, PROTECTION-IN-DEPTH STRATEGY, PROTECTIONPILOT, SECURE MESSAGING SERVICE, SECURITYALLIANCE, SITEADVISOR, THREATSCAN, TOTAL PROTECTION, VIREX, VIRUSSCAN, WEBSHIELD are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries. McAfee Red in connection with security is distinctive of McAfee brand products. All other registered and unregistered trademarks herein are the sole property of their respective owners.
NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANIES YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEB SITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND.