- Knowledge base
- Network & System Security
- Scanning techniques
-
Security updates
-
Product news
-
Next-Gen Vulnerability Management
-
Getting started
-
General
-
Operating status
-
Network & System Security
-
Web Application Security
-
Cloud Security
-
API Security
-
Phishing Simulation & Awareness Training
-
Attack Surface Management
-
Scanner Appliance
-
Device Agent
-
On-premise platform deployment
-
Asset management
-
Vulnerability manager
-
Reports
-
Digest reports
-
Organizer
-
Continuous monitoring
-
Integrations
-
Platform API
-
Remediation
-
Users
-
PCI DSS
-
Terms & conditions
-
Dashboard
How to scan for known exploits and ransomware?
Our default Full network scan configuration includes both those options, but if you want to scan only for them, we advise you to select the "Basic" scan configuration and then enable the option of your choice.
Some known exploits are not covered in standard profiles
To fully cover all tests that have exploits/ransomware relationships, you will also have to include potentially dangerous tests in the scan configurations of either "Basic" or "Full" scans since some related tests will actively exploit known vulnerabilities.
https://support.holmsecurity.com/knowledge/how-do-i-run-a-scan-with-potentially-dangerous-test