Install scanner on Linux server to detect vulnerabilities.
Browse to the installation command on the FutureVuls screen and execute it on the Linux server to install the scanner.
From the account icon in the upper right corner, click Group Settings
and select Scanner
from the left tab.
Set options as needed.
You can select scan modeor specify a proxy server. If not required, leave the default values as they are.
Item | Description |
---|---|
VULS_SCAN_MODE | Select whether to grant Root privileges when executing the scan. Grant Root privileges when executing scan. FAST-ROOT: Capable of obtaining information such as whether or not the package needs to be restarted and the status of process startup. FAST: Do not grant Root privilege at scan execution. Information not available. |
VULS_SCAN_OFFLINE | Select online scan or offline scan. -(No Value): Performs scans in the online environment, which is the normal scan mode. OFFLINE: Unsupported OS available. |
AUTO_REFRESH_BINARY | Configure scanner auto-update. TRUE: Update the scanner binary at each scan. FALSE: Do not automatically update the scanner binary. |
VULS_PROXY | If you are using a proxy environment, specify the URL of the proxy server to go through. |
SeeManualfor details.
root@scan01:~# curl -s https://installer.vuls.biz/vuls-installer.sh | VULS_SAAS_GROUPID="nnn" VULS_SAAS_TOKEN="xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx" VULS_SCAN_MODE="fast-root" bash -s inst
2019/05/01 00:00:00 [START ]: Install scanner.
2019/05/01 00:00:00 [SUCCESS ]: Check root user.
2019/05/01 00:00:00 [SUCCESS ]: Check distribution. [OS: ubuntu]
2019/05/01 00:00:00 [SUCCESS ]: Check Architecture [arch: x86_64]
2019/05/01 00:00:30 [SUCCESS ]: Install package. [debian-goodies]
2019/05/01 00:00:30 [SUCCESS ]: Create user and group. [user: vuls-saas / group: vuls-saas]
2019/05/01 00:00:30 [SUCCESS ]: Create directory. [/opt/vuls-saas]
2019/05/01 00:00:30 [SUCCESS ]: Create directory. [/var/log/vuls]
2019/05/01 00:00:35 [SUCCESS ]: Download binary. [/opt/vuls-saas/vuls type: linux_x86_64]
2019/05/01 00:00:35 [SUCCESS ]: Download script. [/opt/vuls-saas/vuls-saas.sh]
2019/05/01 00:00:35 [SUCCESS ]: Create config. [/opt/vuls-saas/config.toml]
2019/05/01 00:00:35 [SUCCESS ]: Create sudoers. [/etc/sudoers.d/vuls-saas]
2019/05/01 00:00:35 [SUCCESS ]: Create cron. [/etc/cron.d/vuls-saas-scan]
2019/05/01 00:00:35 [END ]: Install scanner finish.
root@scan01:~#
The first automatic scan will be performed 5 minutes after the installation completion time, but you can also perform it manually if you want to scan now.
Run /opt/vuls-saas/vuls-saas.sh
with the vuls-saas
user privileges as follows.
vuls-saas
user with sudo
.root@scan01:~# sudo -H -u vuls-saas /opt/vuls-saas/vuls-saas.sh >/dev/null 2>&1
root@scan01:~#
vuls-saas
user and run.root@scan01:~# su - vuls-saas
vuls-saas@scan01:~$ /opt/vuls-saas/vuls-saas.sh
vuls-saas@scan01:~$
After the scan is finished, it will be reflected on the web screen after a while. If it is not reflected after waiting a few minutes, look at the log.
The execution result is recorded in the following file, so please look at the error and check the cause.
The scan time is set based on the installation time. Change this if necessary.
/etc/cron.d/vuls-saas-scan
.
root@scan01:~# cat /etc/cron.d/vuls-saas-scan
5 0 * * * vuls-saas /opt/vuls-saas/vuls-saas.sh >/dev/null 2>&1
root@scan01:~#