- Knowledge base
- Network & System Security
- Authenticated Network Scanning
-
Security updates
-
Product news
-
Next-Gen Vulnerability Management
-
Getting started
-
General
-
Operating status
-
Network & System Security
-
Web Application Security
-
Cloud Security
-
API Security
-
Phishing Simulation & Awareness Training
-
Attack Surface Management
-
Scanner Appliance
-
Device Agent
-
On-premise platform deployment
-
Asset management
-
Vulnerability manager
-
Reports
-
Digest reports
-
Organizer
-
Continuous monitoring
-
Integrations
-
Platform API
-
Remediation
-
Users
-
PCI DSS
-
Terms & conditions
-
Dashboard
What is an authenticated scan?
An authenticated network scan is used to access the system from within by logging in with a user account, where information such as patch levels, software versions, and the systems registry can be assessed.
The success of an authenticated scan depends on the scanned OS and the permissions levels of the user account utilized by the scan to authenticate to the system.
For example:
- Windows systems
On Windows systems, an unprivileged user is restricted and can't access areas like the Windows registry or the Windows system folder.
Users with administrative permissions provide more results on Windows systems. - Linux systems
On Linux systems, an unprivileged user is enough and can access the important areas for a good result.'
Important information
When running an authenticated scanning, detecting more vulnerabilities is expected compared to unauthenticated scanning.