- Knowledge base
- Network & System Security
- Policy scanning
-
Security updates
-
Product news
-
Next-Gen Vulnerability Management
-
Getting started
-
General
-
Operating status
-
Network & System Security
-
Web Application Security
-
Cloud Security
-
API Security
-
Phishing Simulation & Awareness Training
-
Attack Surface Management
-
Scanner Appliance
-
Device Agent
-
On-premise platform deployment
-
Asset management
-
Vulnerability manager
-
Reports
-
Digest reports
-
Organizer
-
Continuous monitoring
-
Integrations
-
Platform API
-
Remediation
-
Users
-
PCI DSS
-
Terms & conditions
-
Dashboard
How do I create a policy scan profile?
To be able to run a policy scan, you need to set up a policy scanning profile, and this needs to be an authenticated profile; here is how you do it:
- Log in to the Security Center.
- Click on Scan Profiles.
- Click on +Create scan profile > Policy profile.
- Under the headline General settings, enter the following:
- Name: the name of the Scan profile.
- Owner: the owner of the report.
- Under the headline Policy, choose your desired template.
- Under the headline Authentication, you can add a new authentication record or choose an existing one for Windows and Linux/Unix. Notice that you can only have one authentication record per profile and operating system. See the instructions below.
Linux/Unix authentication record
- Set the Authentication information by clicking the drop-down and selecting New.
- Select a Name for your Authentication Record
- Add the Port to be used for authentication if you have a specific port. Otherwise, the standard port 22 will be used.
- Type the Username to be used for the authentication.
- Choose the method of authentication: SSH Key or Password.
- Add the information based on the choice you made.
- Done!
Linux Authentication Method
For the password option, we require password authentication to be turned on for the SSH service.
For the SSH Key option, we require an SSH-authorized RSA private key.
Windows authentication record
- Set the Authentication information by clicking the drop-down and selecting New.
- Select a Name for your Authentication Record
- Type in the credentials you would like to use for your authenticated scan.
- Username
- Password
- Domain
- Choose which NTLM protocol (NTLM v2, NTLM v1, or NTLM v2 Only) to use based on your network configuration.
- Done!
Authenticated scanning
Read this for more information regarding authenticated network scans:
What is an authenticated scan?