What is Internet Scanner SAFEsuite? contents.gifindex.gif

What is Internet Scanner SAFEsuite?

SAFEsuite is the fastest, most comprehensive, proactive Windows NT™ and UNIX network security scanner available. It configures easily, scans quickly, and produces comprehensive reports.

SAFEsuite probes a network environment for selected security vulnerabilities, simulating the techniques of a determined hacker. Depending on the reporting options you select, SAFEsuite gives you information about each vulnerability found: location, in-depth description, and suggested corrective actions.

SAFEsuite is made up three integrated modules:

ISS_NT00000000.gif Internet Scanner: Provides a comprehensive set of vulnerability tests. These tests affect services (such as RPC, NFS, Sendmail, Anonymous FTP, NNTP, and others), environments (like X Windows), and NetBIOS. The Internet Scanner also tests for vulnerability to Brute Force attacks and Denial of Service attacks.

ISS_NT00000000.gif Firewall Scanner: Provides a rigorous series of vulnerability tests specific to Firewalls.

ISS_NT00000000.gif Web Scanner: Provides essential vulnerability test for Web servers.

SAFEsuite can be used on all TCP/IP-based networks -- networks connected to the Internet as well as stand-alone networks and machines. Keep in mind that there is a considerable threat from internal sources and that your network should be secure from both internal and external dangers.

SAFEsuite should be run periodically. You should test the security of network devices and the integrity of the network on a regular basis to detect newly introduced weaknesses as well as changes in the network makeup. It is better to take preventive measures than to repair the damage a malicious intruder can inflict.

How SAFEsuite Works

A Thorough Battery of Tests

Automated Scanning

Fully Configurable

How do I use the Scanner?

Using SAFEsuite on a day-to-day basis involves:

ISS_NT00000000.gif Running scans of the network. You can run scans using the Graphical User Interface or from the command line. You can also set up the scan to run unattended as an at command (Windows NT) or cron job (UNIX). See Scanning the Network.

ISS_NT00000000.gif Analyzing the results. You can analyze the results of scans through the Graphical User Interface or from the command line. Either way, you have the ability to interactively create and examine reports.

For more information on some of the Scanners basic concepts, click on one of the following definitions, in part excerpted from the Free On-line Dictionary of Computing
(
http://wfn-shop.princeton.edu/cgi-bin/foldoc)

Vulnerabilities

Services

Hosts

Users

Social Engineering

For suggestions on troubleshooting, Technical Support, or further reading on network security, click on the following links:

Troubleshooting the Scanner

For Further Information