Glossary

gvmd

Management daemon shipped with GVM 10 and later. Abbreviation for Greenbone Vulnerability Manager Daemon.

openvassd

Scanner daemon used by GVM 10 and before. It listens for incoming connections and starts scan processes to run the actual vulnerability tests. It collects the results and reports them to the management daemon. With the GVM 11 release, it has been converted to the openvas application by removing the daemon and replacing the communication protocol. Abbreviation for OpenVAS Scanner Daemon.

openvas

Scanner application executable to run vulnerability tests against targets and to store scan results into a Redis database. Used in GVM 11 and later. It has originated from the openvassd.

OSPd

A framework for several scanner daemons speaking the Open Scanner Protocol (OSP).

ospd-openvas

A OSP scanner daemon managing the openvas executable for reporting scan results to the management daemon gvmd. Used in GVM 11 and later.

gsad

A web server providing the Greenbone Security Assistant web application.

GSA

The Greenbone Security Assistant (GSA) web application to control scans and access vulnerability information via a web interface in a browser.

GOS

Greenbone Operating System, the operating system of the Greenbone Enterprise Appliance. It provides the commercial version of the GVM framework with enterprise support and features.

GSM

Greenbone Security Manager is the former name of our commercial product line Greenbone Enterprise as hardware or virtual appliances.

GMP

The Greenbone Management Protocol (GMP) is an XML-based communication protocol provided by gvmd. It provides an API to create, read, update and delete scans and vulnerability information.

OSP

The Open Scanner Protocol is an XML-based communication protocol provided by ospd-openvas. It provides an API to start scans, get VT information and to receive scan results.

GVM

The Greenbone Community Edition consists of several services. This software framework has been released as Greenbone Vulnerability Management (GVM). It is developed as part of the commercial Greenbone Enterprise product line. Sometimes referred to as the OpenVAS framework.

Greenbone Community Edition

The Greenbone Community Edition covers the actual releases of the Greenbone application stack for vulnerability scanning and vulnerability management GVM provided as open-source software to the community. The Greenbone Community Edition is adopted by external third parties, e.g., if the GVM stack is provided by a Linux distribution, it is build from the Greenbone Community Edition.

Greenbone Community Containers

Container images that are pre-build on GitHub and available via dockerhub. These images can be used to run the newest versions of the Greenbone Community Edition without having to care about the operating system, compiler and build tool chains.

Greenbone Enterprise

Greenbone Enterprise is the Greenbone product line for on-premises solutions. Included are virtual or hardware Greenbone Enterprise Appliances with the Greenbone Operating System (GOS), the Greenbone Vulnerability Management (GVM) framework, and the Greenbone Enterprise Feed.

Greenbone Community Feed

The Greenbone Community Feed is the freely available feed for vulnerability information licensed as open-source. It contains basic scan configurations, report formats, port lists and the most important vulnerability tests. The provided data is updated on a daily basis with no warranty or promises for fixes or completeness.

Greenbone Enterprise Feed

The Greenbone Enterprise Feed is the commercial feed provided by Greenbone Networks containing additional enterprise features like vulnerability tests for enterprise products, policy and compliance checks, extensive reports formats and special scan configurations. The feed comes with a service-level agreement ensuring support, quality assurance and availability.

VT

Vulnerability Tests (VTs), also known as Network Vulnerability Tests (NVTs), are scripts written in the NASL programming language to detect vulnerabilities at remote hosts.

SCAP

Abbreviation for Security Content Automation Protocol. It is used for providing CPE and CVE data via the Greenbone Enterprise and Community Feeds.

CPE

Abbreviation for Common Platform Enumeration. Common Platform Enumeration (CPE) is a standardized method of describing and identifying classes of applications, operating systems, and hardware devices present among an enterprise’s computing assets.

CVE

Abbreviation for Common Vulnerabilities and Exposures. It provides unique, common identifiers for publicly known information-security vulnerabilities in publicly released software packages.