-
Security updates
-
Product news
-
Next-Gen Vulnerability Management
-
Getting started
-
General
-
Operating status
-
Network & System Security
-
Web Application Security
-
Cloud Security
-
API Security
-
Phishing Simulation & Awareness Training
-
Attack Surface Management
-
Scanner Appliance
-
Device Agent
-
On-premise platform deployment
-
Asset management
-
Vulnerability manager
-
Reports
-
Digest reports
-
Organizer
-
Continuous monitoring
-
Integrations
-
Platform API
-
Remediation
-
Users
-
PCI DSS
-
Terms & conditions
-
Dashboard
How do I use the Scanner Appliance Proxy?
Many organizations require traffic to be passed through a corporate HTTP or HTTPS proxy before it can hit the Internet. This means any requests to the Internet should first go through the proxy server first.
With this feature enabled, the proxy server forwards probe requests to the Holm servers. It acts as an intermediary, facilitating the flow of information and providing an added layer of control and protection.
The Scanner Appliance Proxy works with the most common stable proxies: HTTP and HTTPS, both authenticated (with username and password) and non-authenticated.
How do I configure the Proxy?
- The Proxy must allow traffic to Holm Security servers so the Scanner Appliance can reach Holm Security servers via proxy. Check this article to see the firewall settings.
- Your Scanner Appliance needs to have at least version 59 to have access to the proxy.
- Open up the Scanner Appliance virtual machine in your virtualization platform.
- Go to configuration > Proxy.
- Type in the Proxy URL and click F11 to save.
- Done!
What external communication to Holm Security servers is covered by the proxy?
- Operating system updates (APT packages - Holm Security APT server)
- Application updates (docker containers, PyPI packages - Holm Security registry server and PyPI server)
- Communication with Holm Security Center
- NVT feed updates (Holm Security download server)
- DNS (You will need to set your DNS)
- NTP (You will need to set your DNS)
- Network, Web, and policy scanning engine
Important information
Ports 443 and 8022 should be added to the safe list on the proxy (it depends on the proxy type; for some proxies, port 443 is allowed by default, and port 8022 must be added to the safe list).