
iii
Adding Peripheral Information............................................................................................................59
Associating Users, Software, & Peripherals With Systems..................................................................60
Associating Users with Systems.........................................................................................................61
Associating Software with Systems....................................................................................................62
Associating Peripherals with Systems ................................................................................................62
Removing Assets from SnoopWall NetSHIELD ..................................................................................63
Malware detection system .....................................................................................................................64
overview............................................................................................................................................64
configuration malware detection.........................................................................................................64
malware detection system..................................................................................................................64
Managing Whitelist For Detected Malware IP Address(es)..............................................................66
Managing Manual Malware IP Addresses....................................................................................67
Viewing Malware IP Address History...............................................................................................68
Viewing Malware Signature Update Schedule.................................................................................68
Audits....................................................................................................................................................69
Creating and Managing Audits ...........................................................................................................69
Running a One-Click Audit.................................................................................................................69
Defining A New Audit.........................................................................................................................70
Assigning an Audit Name................................................................................................................71
Setting Vulnerability Threshold for Notification ................................................................................71
Modifying Who Receives Reports ...................................................................................................72
Scheduling Audits..............................................................................................................................73
Scheduling Backups and Audits.........................................................................................................73
Setting Audit Frequency and Start Time..........................................................................................73
Choosing IP Addresses From List......................................................................................................74
Selecting/Grouping IP Addresses to Audit..........................................................................................75
Saving the Audit.................................................................................................................................75
Activating & Managing Audits.............................................................................................................76
Scheduling an Audit to Run................................................................................................................76
Starting an Audit.............................................................................................................................76
Deactivating an Audit .........................................................................................................................77
Removing an Audit.............................................................................................................................77
Modifying an Existing Audit’s Definition ..............................................................................................78
Copying an Audit to Create a Variation...............................................................................................78
Removing Systems/IP Addresses from an Audit.................................................................................78
Viewing Lists of CVE Tests by OS and Application.............................................................................79
Managing Known Missing Assets...........................................................................................................79
Viewing SnoopWall NetSHIELD Schedule.............................................................................................80