- Knowledge base
- Network & System Security
- Scanning techniques
-
Security updates
-
Product news
-
Next-Gen Vulnerability Management
-
Getting started
-
General
-
Operating status
-
Network & System Security
-
Web Application Security
-
Cloud Security
-
API Security
-
Phishing Simulation & Awareness Training
-
Attack Surface Management
-
Scanner Appliance
-
Device Agent
-
On-premise platform deployment
-
Asset management
-
Vulnerability manager
-
Reports
-
Digest reports
-
Organizer
-
Continuous monitoring
-
Integrations
-
Platform API
-
Remediation
-
Users
-
PCI DSS
-
Terms & conditions
-
Dashboard
How do I run a scan with potentially dangerous tests?
Holm Security provides the option to conduct more intensive tests on your network environment. If you want to perform a potentially dangerous test, follow the steps below.
Learn more about potentially dangerous tests
To better understand the subject, please read the following article.
https://support.holmsecurity.com/knowledge/what-are-potentially-dangerous-test-and-tests-that-perform-active-break-in-attempts
- Log in to the Security Center.
- Click Scan network > Scan profiles.
- Create a new profile or Edit an existing profile.
- Go to Vulnerabilities and scroll down to Stability.
- De-select the box for Skip potentially dangerous tests.
- Click OK to save your settings.
- You can now proceed to configure your scan. To learn the necessary steps for scheduling a scan, refer to our comprehensive guide here:
https://support.holmsecurity.com/knowledge/how-do-i-schedule-a-scan - Done!
Warning regarding potentially dangerous tests
The category Potentially dangerous tests might prove to be harmful to your environment. Holm Security recommends testing a very limited selection of assets and slowly scaling up. To ensure potentially harmful effects don't occur in several parts of the environment simultaneously.