Glossary#

gvmd#

Management daemon shipped with GVM 10 and later. Abbreviation for Greenbone Vulnerability Manager Daemon.

openvassd#

Scanner daemon used by GVM 10 and before. It listens for incoming connections via OTP and starts scan processes to run the actual vulnerability tests. It collects the results and reports them to the management daemon. With GVM 11 it has been converted into the openvas application by removing the daemon and OTP parts. Abbreviation for OpenVAS Scanner Daemon.

openvas#

Scanner application executable to run vulnerability tests against targets and to store scan results into a redis database. Used in GVM 11 and later. It has originated from the openvassd daemon.

OSPd#

A framework for several scanner daemons speaking the Open Scanner Protocol (OSP).

ospd-openvas#

A OSP scanner daemon managing the openvas executable for reporting scan results to the management daemon gvmd. Used in GVM 11 and later.

GOS#

Greenbone Operating System, the operating system of the Greenbone Enterprise Appliance. It provides the commercial version of the Greenbone Community Edition with enterprise support and features.

GSM#

Greenbone Security Manager (GSM) is the former name of our commercial product line Greenbone Enterprise as hardware or virtual appliances.

GMP#

The Greenbone Management Protocol (GMP) is an XML-based communication protocol provided by gvmd. It provides an API to create, read, update and delete scans and vulnerability information.

OSP#

The Open Scanner Protocol is an XML-based communication protocol provided by ospd-openvas. It provides an API to start scans, get VT information and to receive scan results.

GVM#

The Greenbone Community Edition consists of several services. This software framework has been named Greenbone Vulnerability Management (GVM) in the past.

Greenbone Community Edition#

The Greenbone Community Edition covers the actual releases of the Greenbone application framework for vulnerability scanning and vulnerability management provided as open-source software to the community. The Greenbone Community Edition is adopted by external third parties, e.g., if the software framework is provided by a Linux distribution, it is build from the Greenbone Community Edition. It is developed as part of the commercial Greenbone Enterprise product line. Sometimes referred to as the OpenVAS framework.

GVM9#

Version 9 of the Greenbone Community Edition. Also known as OpenVAS 9. Used in the GOS 4 series.

GVM10#

Version 10 of the Greenbone Community Edition. Used in GOS 5.

GVM11#

Version 11 of the Greenbone Community Edition. Used in GOS 6.

GVM20.08#

Version 20.08 of the Greenbone Community Edition. Used in GOS 20.08. First version using Calendar Versioning

GVM21.4#

Version 21.4 of the Greenbone Community Edition. Used in GOS 21.04.

GVM22.4#

Version 22.4 of the Greenbone Community Edition. Used in GOS 22.04.

Greenbone Enterprise#

Greenbone Enterprise is the Greenbone product line for on-premises solutions. Included are virtual or hardware Greenbone Enterprise Appliances with the Greenbone Operating System (GOS), the Greenbone Community Edition framework, and the Greenbone Enterprise Feed.

Greenbone Community Feed#

The Greenbone Community Feed is the freely available feed for vulnerability information licensed as open-source. It contains basic scan configurations, report formats, port lists and the most important vulnerability tests. The provided data is updated on a daily basis with no warranty or promises for fixes or completeness.

Greenbone Enterprise Feed#

The Greenbone Enterprise Feed is the commercial feed provided by Greenbone Networks containing additional enterprise features like vulnerability tests for enterprise products, policy and compliance checks, extensive reports formats and special scan configurations. The feed comes with a service-level agreement ensuring support, quality assurance and availability.

VT#

Vulnerability Tests (VTs), also known as Network Vulnerability Tests (NVTs), are scripts written in the NASL programming language to detect vulnerabilities at remote hosts.