Select Machines

Use this section to select the machines Vulnerability Assessment scans during an Assessment Task. Select machines by machine name or IP address. The default setting is by machine name. Before proceeding with machine selection, the login credentials for these machines should be added in the Account Management Tool first. See Account Management Tool Tutorial.

There are two ways to add machines to a task: by machine name or by IP address. Choose one method and follow the directions below. If you change the method you are using to input machines, a message appears informing you that your current selections will be discarded. To discard your selections, click OK. To keep these selections, click Cancel. You return to Select Machines.

 

Selecting machines by name

  1. Click By machine name.

  2. Select a specific machine, and/or domain (all machines under the selected domain will be selected too) in the left hand tree. To select multiple machines and/or domains, push the shift and control keys while selecting. To view the machines which are part of a domain, click the desired domain.

  3. Click Add> to add a machine or a domain. Alternatively, click Add All >> to add all machines and domains in the right hand tree. After adding the machines and domains they will appear in the right hand tree.

  4. Click Save to save these selections and return to Create a Vulnerability Assessment Task. Click Cancel to discard the changes and return to Create a Vulnerability Assessment Task.

Removing machines by machine name

  1. Select a specific machine or a domain in the right hand tree (all machines under the selected domain will be selected too). To select multiple machines and/or domains, push the shift and control keys while selecting. To view the machines which are part of a domain, click the domain.

  2. Click <Remove to remove a machine or domain. Alternatively, click << Remove All to remove all visible machines and domains. After removing the machines or domains, they will appear in the right hand tree.

  3. Click Save to save these selections and return to Create a Vulnerability Assessment Task. Click Cancel to discard the changes and return to Create a Vulnerability Assessment Task.

Selecting machines by IP address

  1. Click By IP address.

  2. Type the first IP address in IP address:. It is important that all target machines that are part of the specified range have the same login credentials. Press Delete to modify a value or Tab to type the next value. Valid addresses follow the following format: (0~255).(0~255).(0~255).(0~255), for example:192.168.1.12

  3. Click next to IP address : to add the IP address to the list. The IP address appears in the right-hand box.

  4. Click Save to save these selections and return to Create a Vulnerability Assessment Task. Click Cancel to discard the changes and return to Create a Vulnerability Assessment Task.

Selecting machines by range of IP addresses

  1. Click By IP address.

  2. Type the first IP address in IP address from:. It is important that all target machines part of the specified range have the same login credentials. Press Delete to modify a value or Tab to type the next value. Valid addresses follow the following format: (0~255).(0~255).(0~255).(0~255), for example:192.168.1.12

  3. Type a subnet value in IP address to: (the subnet value is the last set of numbers in an IP address).The subnet value of the first IP address should be inferior than the corresponding value of the last IP address. The valid subnet values are 1 through 255. Press the Delete button to modify a value.

  4. Click next to IP address from: and IP address to: to add the range specified above. After adding a range, the first and last IP addresses will appear in the right hand box.

  5. Click Save to save these selections and return to Create a Vulnerability Assessment Task. Click Cancel to discard the changes and return to Create a Vulnerability Assessment Task.