- Knowledge base
- Network & System Security
- Optimization
-
Security updates
-
Product news
-
Next-Gen Vulnerability Management
-
Getting started
-
General
-
Operating status
-
Network & System Security
-
Web Application Security
-
Cloud Security
-
API Security
-
Phishing Simulation & Awareness Training
-
Attack Surface Management
-
Scanner Appliance
-
Device Agent
-
On-premise platform deployment
-
Asset management
-
Vulnerability manager
-
Reports
-
Digest reports
-
Organizer
-
Continuous monitoring
-
Integrations
-
Platform API
-
Remediation
-
Users
-
PCI DSS
-
Terms & conditions
-
Dashboard
How do I optimize scans for sensitive environments?
In a highly sensitive environment with challenging-to-access targets, the primary goal is to conduct a careful scan to identify vulnerabilities while minimizing potential disruptions.
Learn more about optimizing scans.
We recommend reading the main article on optimizing scans to better understand the settings mentioned in this article. This will provide valuable information on making the most of your scans and ensure efficient and accurate results.
https://support.holmsecurity.com/knowledge/how-do-i-optimize-scans
Recommended scan profile settings
Port Selection: Choose the "Light" port list, representing the most used ports, to ensure a comprehensive assessment of vulnerabilities while reducing scan time and minimizing potential disruptions in a sensitive environment.
Customizable scanner configurations
- Scan Intensity: Opt for "Low Intensity" to prioritize network politeness and minimize potential disruptions in a sensitive environment. This mode ensures a slower but more considerate scan.
- Hosts to Scan in Parallel: Select "Low" intensity to scan one host at a time. This approach is suited for sensitive environments where minimizing network impact is a priority.
- Processes to Run in Parallel: Set to "Low" to run only one plugin or test at a time on each host, reducing the potential for disruptions in this highly sensitive setting.
- Packet Delay: Configure the "Packet Delay" to "High" (e.g., 400 ms) to introduce longer delays between probes, further emphasizing network politeness while maintaining a comprehensive scan.
- Host Timeout: You can adjust the default 8-hour timeout in the Low template to an extended 10-hour value, providing scanners maximum time for thorough port scanning, especially in environments with challenging-to-reach targets.
Minimizing impact
Please keep in mind that although this scan configuration may take longer, it is specifically designed to minimize any potential impact on the network in highly sensitive environments.