- Knowledge base
- Network & System Security
- Best practice
-
Security updates
-
Product news
-
Next-Gen Vulnerability Management
-
Getting started
-
General
-
Operating status
-
Network & System Security
-
Web Application Security
-
Cloud Security
-
API Security
-
Phishing Simulation & Awareness Training
-
Attack Surface Management
-
Scanner Appliance
-
Device Agent
-
On-premise platform deployment
-
Asset management
-
Vulnerability manager
-
Reports
-
Digest reports
-
Organizer
-
Continuous monitoring
-
Integrations
-
Platform API
-
Remediation
-
Users
-
PCI DSS
-
Terms & conditions
-
Dashboard
What are the recommended settings for scanning SCADA environments?
You can locate and scan connected SCADA devices on your network by importing the profile "Network scan profile-SCADA-OT" directly by following this article. This profile will ensure the safest possible configuration for this type of environment. https://support.holmsecurity.com/knowledge/where-do-i-find-the-scada/ot-scanning-profile
Authentication
Some SCADA products can only be detected using an Authenticated Network scan.
Vulnerability scanning SCADA & OT networks
When performing a vulnerability scan, it is important to take extra precautions. To ensure the safety of your SCADA environment, start by scanning a small range of 1-2 IP addresses. Gradually expand the range if your SCADA environment remains stable. You can also enhance the performance setting to Medium and continue expanding the IP address range slowly. These steps will help you identify potential vulnerabilities while ensuring the stability of your SCADA environment.