Scan environments

The Scan environments menu displays a page with tabs for scanners and scanner policies.

A scan environment is an isolated and secured system within IBM® Storage Defender® where scanners analyze recovery points for malware or anomalies without exposing production data or infrastructure. For more information about scan environments, see Isolated scan environment.

Note: Make sure you have the required access point permissions to perform the actions in this topic. You can also access these actions through the All resources access point. The menus, buttons, and available actions depend on your permission level, and you will only see the options that match your assigned permissions. For more information, see User management.
The Scan environments page displays information within the following tabs:
  • Scanners: The Scanners tab displays a list of all scanners registered in the isolated scan environment. For more information, see Scanners.
  • Scanner policies: The Scanner policy tab displays a list of all configured scanner policies. For more information, see Scanner policies.
Scanners

The Scanners tab displays a table with the following information for all scanners:

Name, Connection status, Version, OS type and version, Scanner policies, Last scan time, Last scan status, Active scans, Recovery groups, Connection managers, and Location.
  • Click a scanner name to get the detailed information. For more information, see Scanner details.
  • Click a connection manager name to get the detailed information. For more information, see Connection managers details.
  • Refine the list of scanners using search bar for a specific search term and use filter icon to filter the list.
  • Click Add scanner button to add a scanner. For more information, see Adding scanner.
  • Click the overflow menu icon in a table row for the scanner that you are interested in to complete the following actions:
    • View scanner: This drop-down option navigates you to the Scanner details > Overview page to view more information about the scanner.
    • Edit system details: to modify system details and review the certificate details.
    • Edit scanner details: to modify scanner details like Name and Description(optional).
    • Associate connection manager: to select a connection manager from the list to associate it with the scanner.
    • Disassociate connection manager: If there are 2 or more connection mangers associated with the scanner, you can select a connection manager from the list to disassociate it with the scanner.
    • Edit system credentials: to select an existing credential or create a new credential.
    • Edit scanner credentials: to select an existing credential or create a new credential.
    • Delete: to delete the scanner from the Data Resiliency Service.
Scanner policies

The Scanner policies tab displays a table with the the following information for all scanner policies:

Name, Recovery groups, Scanners, Snapshot scan frequency, Start time, and Description.

  • Click a scanner name to get the detailed information. For more information, see Scanner details.
  • Refine the list of scanners using search bar for a specific search term and use filter icon to filter the list.
  • Click the Create scanner policy button to create a scanner policy. For more information, see Creating scanner policy.
  • Click the overflow menu icon in a table row for the scanner policy that you are interested in to complete the following actions:
    • Edit policy details: Use this action to modify policy details like Name and Description (optional). For more information, see Edit policy details.
    • Edit snapshot scan frequency: Use this action to configure how often the scanner policy runs a scan on the latest snapshot.For more information, see Edit snapshot scan frequency .
    • Delete: Use this action to delete the scanner policy. For more information, see Deleting scanner policy.

Scan performance considerations