Authenticated Network Scanning

How do I set up authenticated scanning?

To run an authenticated network scan, you need to set up a scanning profile with credentials; here is how you do it:

  1. Log in to the Security Center.
  2. Click on Scan Profiles.
  3. Click on +Create scan profile > Network scan profile.
    (You can also add credentials to one of your existing profiles by editing the profile.)
  4. Under the category Authentication, you can add a new authentication record or choose an existing one for Windows and Linux/Unix. You can only have one authentication record per profile and operating system. See the instructions below.

Other scan profile settings
This article mainly focuses on the configuration of authentication within the scan profiles. To better understand all settings listed in the scan profile, please review this article:
https://support.holmsecurity.com/knowledge/what-does-the-network-scan-profile-settings-mean

Linux/Unix authentication record

  1. Set the Authentication information by clicking the drop-down and selecting New.
  2. Select a Name for your Authentication Record
  3. Add the Port to be used for authentication if you have a specific port. Otherwise, the standard port 22 will be used.
  4. Type the Username to be used for the authentication.
  5. Choose the method of authentication: SSH Key or Password.
  6. Add the information based on the choice you made.
  7. Done!

Linux Authentication Method
For the password option, we require password authentication to be turned on for the SSH service.
For the SSH Key option, we require an SSH-authorized RSA private key.

Windows authentication record

  1. Set the Authentication information by clicking the drop-down and selecting New.
  2. Select a Name for your Authentication Record
  3. Type in the credentials you would like to use for your authenticated scan.
    1. Username
    2. Password
    3. Domain
      1. Ensure that your domain account is properly configured by following the guidelines in this article: https://support.holmsecurity.com/knowledge/how-do-i-set-up-a-custom-domain-user-account-for-authenticated-scans. Correct permissions are essential for your scan to authenticate successfully.
      2. Leave blank if you wish to use a local admin account.
  4. Choose which NTLM protocol (NTLM v2, NTLM v1, or NTLM v2 Only) to use based on your network configuration.
  5. Done!  

Authenticated scanning

Read this for more information regarding authenticated network scans:
What is an authenticated scan?