-
Security Announcements
-
Product News
-
Next-Gen Vulnerability Management
-
Getting Started
-
General
-
Operating Status
-
System & Network Scanning
-
Web Application Scanning
-
Cloud Scanning (CSPM)
-
API Scanning
-
Phishing & Awareness Training
-
Scanner Appliance
-
Device Agent
-
On-premise platform deployment
-
Asset Management
-
Vulnerability Manager
-
Reports
-
Digest Reports
-
Organizer
-
Continuous Monitoring
-
Integrations
-
Platform API
-
Remediation
-
Users
-
PCI DSS
-
Terms & Conditions
-
Dashboard
What happens when the Scanner Appliance scans itself?
The Scanner Appliance is hardened and does not expose any extra ports to the network. Internally on the Scanner Appliance, several ports are available but not exposed to the network and blocked by the internal network rules.If a network scan is carried out from the Scanner Appliance against itself, several ports will be highlighted as being opened.
To retrieve accurate results on what ports and services are exposed from the Scanner Appliance, you need to scan it from another endpoint; for example, Scanner Appliance A is scanning Scanner Appliance B.