HP Insight Vulnerability and Patch Manager software 6.0 User Guide HP Part Number: 579547-001 Published: January 2010, First Edition

3. Follow the on-screen instructions, selecting the appropriate update information for your server environment
when prompted.
4. Click Schedule, and then select a time to acquire daily Vulnerability and Patch Manager updates.
Updates might not be available daily, but scheduling the event daily ensures that you obtain critical
updates promptly. Updates to scan definitions are usually available a few days after new patches are
released.
5. To run the patch acquisition, click Run Now.
The vulnerability and patch acquisition process begins. You can monitor the progress of the acquisition
at C:\Program Files\HP\VPM Acquisition Utility\logs\patch-acquire.log. To
manually scroll through the log file during the acquisition, clear the Enable auto-scroll checkbox.
The Acquisition Log displays the progress of the acquisition. Disregard any messages that appear on
the log screen.
The acquisition process might appear to stall (hang) when downloading large files.
IMPORTANT: Acquiring patches from the Red Hat Network requires the network connection to remain
connected for the duration of the acquisition operation. If the network goes down, you must restart the patch
acquisition.
Scanning for vulnerabilities
Vulnerability and Patch Manager provides a variety of scan definitions. You can use these scans to search
for vulnerabilities or modify them to suit the specific needs of your environment. You can create custom scans
from the default system scans. When default system scans are updated, the custom scans are also updated
with corresponding vulnerability updates.
The following table lists the provided scan definitions that are provided with Vulnerability and Patch Manager
and a brief description of each.
Table 2-3 Provided scan definitions
DescriptionScan definition
Windows NT® 4.0 vulnerabilities
4_0*
Microsoft AdvisoriesAdvisory
Autofixable vulnerabilitiesAutoFix
Microsoft® and Linux vulnerabilities
CrossPlatform
Known and unknown locations file checksFileChecks
Known location file checksFileCheck_KnownLocation
Unknown location file checksFileCheck_UnknownLocation
Internet Explorer vulnerabilitiesIE
IIS vulnerabilitiesIIS
Linux vulnerabilitiesLinux
Malware checksMalware
Password policy checkPassword
Windows NT password policyPasswordChecker
All policy checkPolicy
SQL Server vulnerabilitiesSqlServer
Windows 2000 vulnerabilitiesW2K
Windows 2003 vulnerabilitiesW2K3
Windows® XP vulnerabilities
XP
Windows 2008 server vulnerabilitiesWindows 2008
Scanning for vulnerabilities 11