System & Network Scanning
Scans
- How to overview all open ports for network assets?
- Which Common Vulnerability Scoring System (CVSS) version is used?
- How does Holm Security detect the operating system of the host scanned?
- How does the network discovery work?
- How do I perform a scan that only runs once?
- What impact will network scans have on my network and devices? See all 7 articles
Scan profiles
- What is the difference between Discovery, Basic, Full scan type
- Where do I find the SCADA/OT scanning profile?
- How do I exclude ports from a network scan?
- What is the difference between TCP SYN and TCP SYN + ACK in a scan profile?
- What is the difference between TCP and UDP?
- What does the scan profile settings mean? See all 8 articles
Schedules
Authenticated Network Scans
Scanning techniques
- What are the tests that perform active login attempts?
- How to scan for known exploits and ransomware?
- What are the general requirements and practices for scanning large networks?
- How do I enable potential vulnerabilities?
- How do I enable active exploitation for network scans?
- How do I configure the scan profile to speed up the scan? See all 16 articles