- Knowledge base
- Network & System Security
- Authenticated Network Scanning
-
Security updates
-
Product news
-
Next-Gen Vulnerability Management
-
Getting started
-
General
-
Operating status
-
Network & System Security
-
Web Application Security
-
Cloud Security
-
API Security
-
Phishing Simulation & Awareness Training
-
Attack Surface Management
-
Scanner Appliance
-
Device Agent
-
On-premise platform deployment
-
Asset management
-
Vulnerability manager
-
Reports
-
Digest reports
-
Organizer
-
Continuous monitoring
-
Integrations
-
Platform API
-
Remediation
-
Users
-
PCI DSS
-
Terms & conditions
-
Dashboard
How do I set up authenticated scanning?
To run an authenticated network scan, you need to set up a scanning profile with credentials; here is how you do it:
- Log in to the Security Center.
- Click on Scan Profiles.
- Click on +Create scan profile > Network scan profile.
(You can also add credentials to one of your existing profiles by editing the profile.) - Under the category Authentication, you can add a new authentication record or choose an existing one for Windows and Linux/Unix. You can only have one authentication record per profile and operating system. See the instructions below.
Other scan profile settings
This article mainly focuses on the configuration of authentication within the scan profiles. To better understand all settings listed in the scan profile, please review this article:
https://support.holmsecurity.com/knowledge/what-does-the-network-scan-profile-settings-mean
Linux/Unix authentication record
- Set the Authentication information by clicking the drop-down and selecting New.
- Select a Name for your Authentication Record
- Add the Port to be used for authentication if you have a specific port. Otherwise, the standard port 22 will be used.
- Type the Username to be used for the authentication.
- Choose the method of authentication: SSH Key or Password.
- Add the information based on the choice you made.
- Done!
Linux Authentication Method
For the password option, we require password authentication to be turned on for the SSH service.
For the SSH Key option, we require an SSH-authorized RSA private key.
Windows authentication record
- Set the Authentication information by clicking the drop-down and selecting New.
- Select a Name for your Authentication Record
- Type in the credentials you would like to use for your authenticated scan.
- Username
- Password
- Domain
- Ensure that your domain account is properly configured by following the guidelines in this article: https://support.holmsecurity.com/knowledge/how-do-i-set-up-a-custom-domain-user-account-for-authenticated-scans. Correct permissions are essential for your scan to authenticate successfully.
- Leave blank if you wish to use a local admin account.
- Choose which NTLM protocol (NTLM v2, NTLM v1, or NTLM v2 Only) to use based on your network configuration.
- Done!
Authenticated scanning
Read this for more information regarding authenticated network scans:
What is an authenticated scan?