-
Security updates
-
Product news
-
Next-Gen Vulnerability Management
-
Getting started
-
General
-
Operating status
-
Network & System Security
-
Web Application Security
-
Cloud Security
-
API Security
-
Phishing Simulation & Awareness Training
-
Attack Surface Management
-
Scanner Appliance
-
Device Agent
-
On-premise platform deployment
-
Asset management
-
Vulnerability manager
-
Reports
-
Digest reports
-
Organizer
-
Continuous monitoring
-
Integrations
-
Platform API
-
Remediation
-
Users
-
PCI DSS
-
Terms & conditions
-
Dashboard
How does the network discovery work?
The discovery scan is an automated process that scans a range of IP addresses to identify each individual device and classify them as separate assets. This scanning procedure is the initial step in all network scans, allowing you to map out networks and IP ranges for active hosts and automatically generate them as assets.
If you are running a vulnerability scan, the discovery is completed first. If any alive hosts are found, the scan will proceed to scan ports using either TCP SYN or a 3-way handshake to gather more information.
How do I run a discovery scan?
Follow the steps for this article, and make sure to use a discovery scan profile.
https://support.holmsecurity.com/knowledge/how-do-i-schedule-a-scan