Product manual
GFI LanGuard 12 Scanning Profile Editor | 206
Option Description
Enabling/disabling
checks for all
installed network
devices
To enable network device (including USB device) scanning in a particular scanning profile:
1. From the Network & Security Audit Options tab, click Devices sub–tab.
2. Click Network Devices tab.
3. Select the scanning profile to customize from the left pane under Profiles.
4. From the right pane, select Enable scanning for hardware devices on target computer(s).
Note
Network device scanning is configurable on a scan profile by scan profile basis. Make sure to
enable network device scanning in all profiles where this is required.
Compiling a net-
work device black-
list/white–list
To compile a network device blacklist/white–list for a scanning profile:
1. From the Network & Security Audit Options tab, click Devices sub–tab.
2. Click Network Devices tab.
3. Select the scanning profile to customize from the left pane under Profiles.
4. In the right pane: to create a network device blacklist, specify which devices you want to
classify as high security vulnerabilities in the space provided under Create a high security
vulnerability for network devices which name contains.
For example, if you enter the word ‘wireless’ you will be notified through a high security
vulnerability alert when a device whose name contains the word ‘wireless’ is detected. To create
a network device white–list, specify which devices you want to ignore during network vulnerability
scanning in the space provided under Ignore (Do not list/save to db) devices which name
contains.
Note
Only include one network device name per line.
Configuring
advanced network
device scanning
options
From the Network Devices tab, you can also specify the type of network devices checked by this
scanning profile and reported in the scan results. These include ‘wired network devices’,
‘wireless network devices’, ‘software enumerated network devices’ and ‘virtual network devices’.
To specify which network devices to enumerate in the scan results:
1. From the Network & Security Audit Options tab, click Devices sub–tab.
2. Click on the Network Devices tab (opens by default).
3. Select the scanning profile that you wish to customize from the left pane under Profiles.
4. Click Advanced at the bottom of the page.
5. Set the required options to Yes. Click OK to finalize your settings.
Scanning for USB
devices
To compile a list of unauthorized/unsafe USB devices:
1. From the Network & Security Audit Options tab, click the Devices sub–tab.
2. Click USB Devices tab.
3. Select the scanning profile that you wish to customize from the left pane under Profiles.
4. In the right pane. specify which devices you want to classify as high security vulnerabilities in
the space provided under Create high security vulnerability for USB devices which name
contains:.
For example, if you enter the word ‘iPod’, you will be notified through a high security vulnerability
alert when a USB device whose name contains the word ‘iPod’ is detected.
To create a USB device white–list, specify which USB devices you want to ignore during network
vulnerability scanning in the space provided under Ignore (Do not list/save to db) devices which
name contains.
Note
Only include one USB device name per line.
Table 79: Device scanning options