Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • Choose a company for which you need to run a scan, and navigate to External Scan to create a profile.

...

  • Image Added

Profiles

Users can create different profiles based on the requirement and attach them to assets to be scanned for external scans.

...

  • The created profile can be chosen here if required, if not can select the Scan profile.

...

  • Enter the secure Ignore ports for the required IP address.

  • To add multiple ports, enter a port and press comma or press enter to add.

...

  • Once all the details are provided, click on Save.

  • Select the checkbox of Exclude from scanning in case an IP exclusion is required.

...

  • Select the Scan Later option, to save the credentials and scan later.

...

  • Ports that have been added as Ignore ports will not be shown in external scan alerts. 

...

  • The external scan result will be the same as before.

...

  • In general, when you designate a specific port as an ignored port, such as port 443, it means that alerts will not be triggered specifically for that port. Instead, alerts will only be generated for the remaining open port, such as port 80. This allows you to focus on monitoring and receiving alerts for the designated open port while disregarding alerts for the ignored port.

...

  • In general, if you designate port 443 as the ignored port in the configuration, the alerts for that port will not be received. However, if you edit the configuration to make port 22 secure and initiate a scan for old results only, the status for that port will show as closed.

...

  • Conversely, if you remove port 22 from the secure list and initiate the scan again, a new entry will be created in the old alerts list with the status set as open until the port is removed from the ignore ports.

...

  • To start the scan, select the checkbox to Scan the added IP and then click on Scan Now under Global Actions, or under the Action select the option Scan Now.

...

  • Click on Upload Bulk IP CSV File.

...

  • Click on Upload to upload bulk in CSV file format. You can make use of sample CSV file to upload the correct format data.

...

  • There is an option to Edit or Delete the Discovery Type using the Action column. Any Discovery Type can be edited or deleted if needed.

...

  • Once the scan is completed, navigate to the Results section, to view the details of the added IP.

    Image RemovedImage Added

  • Multiple Results can be deleted, Deleted and Details if chosen using Global the Actions menuas shown below.

...

  • Information such as Ports Scan, Protocol Scan, Service Detections, OverAll Grade, Open Ports, Vulnerabilities, and Operating System Details will be displayed.

...

  • Click View Details under the Vulnerabilities section to get more information about the vulnerabilities.

  • Details such as Category, CVSS, Severity, Remediation, Impact, and Description are captured for Vulnerabilities.

...