Best practice

What are the recommended settings for scanning SCADA environments?

You can locate and scan connected SCADA devices on your network by importing the profile "Network scan profile-SCADA-OT" directly by following this article. This profile will ensure the safest possible configuration for this type of environment. https://support.holmsecurity.com/knowledge/where-do-i-find-the-scada/ot-scanning-profile

Authentication

Some SCADA products can only be detected using an Authenticated Network scan.

Vulnerability scanning SCADA & OT networks
When performing a vulnerability scan, it is important to take extra precautions. To ensure the safety of your SCADA environment, start by scanning a small range of 1-2 IP addresses. Gradually expand the range if your SCADA environment remains stable. You can also enhance the performance setting to Medium and continue expanding the IP address range slowly. These steps will help you identify potential vulnerabilities while ensuring the stability of your SCADA environment.