Knowledge base
Create ticket
Go to Customer Portal
Network & System Security
Security updates
General
Product news
Release notes
Next-Gen Vulnerability Management
General
Unification
Getting started
System & Network Scanning
Web Application Scanning
API Scanning
Phishing & Awareness Training
Cloud Scanning
Scanner Appliance
Device Agent
Reports
Users
Asset Manager
Remediation
Tags
Continuous Monitoring
Vulnerability manager
On-prem deployment
Domain asset discovery
General
Vulnerability tests
Email notifications
Security Center
Contact and opening hours
Security Tools
Providers
Research
Data retention
Security Badge
Operating status
Holm Security VMP
Network & System Security
Troubleshooting
Policy scanning
Best practice
Scanning techniques
Scan profiles
Scans
Schedules
Authenticated Network Scanning
Scan Issues
Optimization
Web Application Security
General
OWASP
Catalog
Scan profiles
Troubleshooting
Authenticated scanning
Schedules
Cloud Security
General
Get started
Microsoft Azure
Amazon Web services (AWS)
Google Cloud Platform (GCP)
Oracle Cloud
API Security
General
Phishing Simulation & Awareness Training
General
Statistics
Whitelisting
Azure AD
Templates
Data privacy
Tags
Attack Surface Management
External Attack Surface Management
Scanner Appliance
Getting started
General
Troubleshooting
Groups
Device Agent
Getting started
General
Troubleshooting
On-premise platform deployment
Get started
General
Troubleshooting
Security
License
Scanner Appliance
Asset management
General
Assets
Tags
Views
Vulnerability manager
General
Views
Ignore and disable
Tickets
Notes and conversations
Unified Vulnerabilities
Reports
General
Templates
Comparison report
Schedules
Digest reports
General
Organizer
General
White-labeling
Continuous monitoring
Monitoring profiles
Integrations
Slack
Webhooks
Jira
Microsoft
TopDesk
ServiceNow
Splunk
IBM
General
Beyond Trust
Domain asset discovery
Platform API
Getting started
General
Remediation
Tickets
Policies
Views
Integrations
Users
General
Users
Authentication & security
Roles
Teams
PCI DSS
General
Terms & conditions
Personal data
Licensing
Contracts signed with Swedish entity (Sweden, Norway, Denmak, Finland, India, SAARC, etc.)
Contracts signed with Dutch entity (Netherlands, Belgium, etc.)
Dashboard
Back to home
Knowledge base
Network & System Security
Security updates
General
Product news
Release notes
Next-Gen Vulnerability Management
General
Unification
Getting started
System & Network Scanning
Web Application Scanning
API Scanning
Phishing & Awareness Training
Cloud Scanning
Scanner Appliance
Device Agent
Reports
Users
Asset Manager
Remediation
Tags
Continuous Monitoring
Vulnerability manager
On-prem deployment
Domain asset discovery
General
Vulnerability tests
Email notifications
Security Center
Contact and opening hours
Security Tools
Providers
Research
Data retention
Security Badge
Operating status
Holm Security VMP
Network & System Security
Troubleshooting
Policy scanning
Best practice
Scanning techniques
Scan profiles
Scans
Schedules
Authenticated Network Scanning
Scan Issues
Optimization
Web Application Security
General
OWASP
Catalog
Scan profiles
Troubleshooting
Authenticated scanning
Schedules
Cloud Security
General
Get started
Microsoft Azure
Amazon Web services (AWS)
Google Cloud Platform (GCP)
Oracle Cloud
API Security
General
Phishing Simulation & Awareness Training
General
Statistics
Whitelisting
Azure AD
Templates
Data privacy
Tags
Attack Surface Management
External Attack Surface Management
Scanner Appliance
Getting started
General
Troubleshooting
Groups
Device Agent
Getting started
General
Troubleshooting
On-premise platform deployment
Get started
General
Troubleshooting
Security
License
Scanner Appliance
Asset management
General
Assets
Tags
Views
Vulnerability manager
General
Views
Ignore and disable
Tickets
Notes and conversations
Unified Vulnerabilities
Reports
General
Templates
Comparison report
Schedules
Digest reports
General
Organizer
General
White-labeling
Continuous monitoring
Monitoring profiles
Integrations
Slack
Webhooks
Jira
Microsoft
TopDesk
ServiceNow
Splunk
IBM
General
Beyond Trust
Domain asset discovery
Platform API
Getting started
General
Remediation
Tickets
Policies
Views
Integrations
Users
General
Users
Authentication & security
Roles
Teams
PCI DSS
General
Terms & conditions
Personal data
Licensing
Contracts signed with Swedish entity (Sweden, Norway, Denmak, Finland, India, SAARC, etc.)
Contracts signed with Dutch entity (Netherlands, Belgium, etc.)
Dashboard
Network & System Security
Take control of security across your systems, computers, OT/SCADA. and IoT devices.
Troubleshooting
How do I avoid unwanted login attempts when scanning?
How do I avoid unwanted login attempts when performing a scan using on-prem?
Cloud services scanning and compliance audit
Policy scanning
How do I set up a Policy scan?
How do I create a policy scan profile?
How do I analyze the result of a Policy scan?
What are the requirements for Policy scanning?
What is policy scanning?
See more
Best practice
What are the recommended settings for scanning SCADA environments?
What is best practice for network scan targets?
Scanning techniques
What type of devices can be disrupted by scans?
How do I include or exclude a specific vulnerability in a scan profile?
How do I exclude IP addresses in a Network Scan
What are the general requirements and practices for scanning large networks?
What are potentially dangerous test and tests that perform active break-in attempts?
What is Exploit-db Database?
What are the tests that perform active login attempts?
How do I run a scan with potentially dangerous tests?
How do I review the configuration used for a scan?
How to scan for known exploits and ransomware?
How do I enable active exploitation for network scans?
How do I enable potential vulnerabilities?
How do I improve the accuracy when scanning web servers?
What type of devices are scanned?
What services does the network scanner try to brute force?
How do low-probability tests work and how can I turn them off?
How do I run a Brute-force only scan?
See more
Scan profiles
How do I create a network scan profile?
What is the difference between Discovery, Basic, Full scan type?
What is the difference between TCP SYN and TCP SYN + ACK in a scan profile?
How do I exclude ports from a network scan?
What is the difference between TCP and UDP?
Where do I find the SCADA/OT scanning profile?
What ports are included in the different scan levels?
What does the network scan profile settings mean?
What scan profiles are available?
See more
Scans
How does the network discovery work?
How do I perform a scan that only runs once?
How do I download a scan result report as a CSV file?
How to overview all open ports for network assets?
How do I download scan results?
Which Common Vulnerability Scoring System (CVSS) version is used?
What impact will network scans have on my network and devices?
How does Holm Security detect the operating system of the host scanned?
See more
Schedules
How do I schedule a scan?
Authenticated Network Scanning
What are the supported systems and requirements?
How do I see if an authenticated network scan was successful or not?
What is an authenticated scan?
How do I set up a custom domain user account for authenticated scans?
How do I configure a scan profile for authenticated scanning?
How do I set up authenticated scanning?
What is the impact of Powershell commands when performing authenticated network scans on Windows?
See more
Scan Issues
Why is my scan not progressing?
Why did a network scan not find any alive/active hosts?
Why did my external (cloud) scan end up in an error?
Optimization
How do I optimize scans for large and medium-sized networks?
How do I optimize scan performance?
How do I optimize scans for a small amount of IP addresses?
How do I optimize scans for sensitive environments?
What methods is used to detect vulnerabilities?
See more