-
Security updates
-
Product news
-
Next-Gen Vulnerability Management
-
Getting started
-
General
-
Operating status
-
Network & System Security
-
Web Application Security
-
Cloud Security
-
API Security
-
Phishing Simulation & Awareness Training
-
Attack Surface Management
-
Scanner Appliance
-
Device Agent
-
On-premise platform deployment
-
Asset management
-
Vulnerability manager
-
Reports
-
Digest reports
-
Organizer
-
Continuous monitoring
-
Integrations
-
Platform API
-
Remediation
-
Users
-
PCI DSS
-
Terms & conditions
-
Dashboard
When are assets created?
An asset is created based on the settings applied when running a network scan. Holm Security tests an asset over TCP and ICMP to assert if the host is Active or Inactive.
All active Hosts will appear in the Asset list.
The following ports are scanned by default. Note that additional ports can be added manually.
- 21, 22, 23, 25, 53, 80, 110, 111, 135, 139, 143, 443, 445, 993, 995, 1723, 3306, 3389, 5900, 8080
ICMP
A test that sends a regular ICMP ping to check if the host is reachable.