Protect4S - VM User Guide
  • Protect4S - VM User Guide
  • Introduction
    • Quick setup
    • Support
    • Protect4S VM place in SAP system landscape
  • Pre-conditions and installation
    • Supported operating system and database types
    • Software version requirements
    • Recommendations
    • Heterogeneous database connections
  • Protect4S VM Software Installation
    • Add-On Installation, import support packages and upgrade
    • Installation post-processing
  • Create Protect4S VM users and roles
    • Distribution of satellite roles
    • satellite system ABAP RFC user using wizard
    • satellite system ABAP RFC user MANUAL SETUP
    • satellite system JAVA user
    • satellite system database user
    • satellite system operating system user
    • Operating system user other than <sid>adm
    • Satellite system BusinessObjects user
  • Check and set Application settings
  • Protect4S VM Menu
  • Execute the Quick setup
    • Company
    • Systems
      • Creating an ABAP system
      • Creating a JAVA system
      • Creating a BusinessObjects BI system
      • Creating a HANA standalone system
      • Creating a SAP Web Dispatcher system
      • Creating a SAProuter system
      • Creating a SAP Cloud Connector system
      • SAPControl security settings
  • Create a project
    • New project
    • New Scan
  • Check Template
  • Contact persons and Scan subscription
    • Contact persons
    • Scan subscriptions
  • Reports
    • Scan result
    • Scan results information
    • System tab
    • Company tab
    • Scan statistics tab
    • Check overview
    • Risk history
    • Scan statistics
    • Scan export
    • Mitigation report
    • Scan comparison
    • Management overview
    • Connection map
  • Mitigation of Vulnerabilities
    • Mitigation menu
  • Check exemptions
  • SIEM Interface
  • Integration
    • Incident Management
  • Information and support
    • Welcome menu
    • Product information
    • Check information
    • Change log
    • User Guide
    • Report a software defect
    • Feature request
  • Deinstallation
  • Appendix A: Troubleshooting Satellite System connection issues
    • SAPControl connections
    • Database connection
    • JAVA connection
    • HTTPS certificate errors
  • Appendix B: Installation database libraries
    • IBM DB2
    • MSSQL
    • MaxDB
    • Oracle
    • SAP Sybase
    • SAP HANA
  • Appendix C: satellite system Communication Ports
  • Appendix D: Protect4S VM SICF Services
  • Appendix E: using a server group
  • Appendix F System context
  • Appendix G DNS resolving
  • Appendix H Dump in Scan subsciptions
  • Appendix I HTTPURLLOC table
  • Appendix J - Risk Matrix
  • Appendix K - Short dump function module "PFL_GET_SINGLE_PARAMETER" not found
  • FAQs
    • General
    • Installation
    • Configuration
    • Projects and scans
  • Contact us
Powered by GitBook
On this page

Was this helpful?

  1. Contact persons and Scan subscription

Scan subscriptions

PreviousContact personsNextReports

Last updated 1 year ago

Was this helpful?

  • A scan is a vulnerability assessment run by Protect4S VM.

Any contact person may subscribe him-/herself to the notification process for one or more Scan(s). This means that a mail will be send to the mail address supplied for the contact person and according to the notification period set for that user.

If such (a) subscription(s) exists, a periodic mail will inform the contact persons that some scans, which he/she has subscribed to, have finished during the last period. The mail contains links to each finished Scan. In order to see the Scan details, the contact person must first logon to the Protect4S system.

Scan subscriptions may be accessed via "My contact profile" under settings using the button "Scan subscriptions".

This will open a screen showing a list of subscriptions and where subscriptions can be created deleted:

In the Scan subscription menu, you may subscribe yourself to individual scans. For this, you have to select a Scan ID and also specify the Minimum risk level rating that these scans should have.

Including scan results as attachment

By using the scan subscription, you may decide whether to include the results as attachment in the email or not. We suggest not to include the attachments to have the vulnerabilities send over the email due to potential risk. Should you decide to use this functionality, do know that once the attachment is sent out by email. You will lose control over who can view all the weaknesses of your system. As an example the file might forwarded from receiver to another person without your knowledge.

Scan Notification list

Please note that Scan Notifications are only send out if the send job has been scheduled correctly (see the background jobs in the Application Settings) and if the Email out configuration in transaction SCOT has been set up correctly. Note, email configuration within the system is client dependent. Please consult your basis consultant for setting up the email settings within the system.