Introduction

Each of these gives a different view of the asset and is available to view in the Asset View. 

Company Level

Discovery Settings

IP Ranges

The domain name functions as a link to the IP address. Links do not contain actual information, but they do point to the place where the IP address information resides. It is convenient to think of IP addresses as the actual code and the domain name as a nickname for that code.

Copy To Probe

From one probe agent to another probe agent, the IP range will be copied within the same company. Duplicates will be discarded.

SNMP Credentials

  • The SNMP is used for the scanning of supported network devices using SNMP v1/v2 OR SNMP v3.

  • SNMP read-only credentials can be added under the SNMP Credentials section for network devices.

The protocols used for Authentication are MD5 and SHA (Secure Hash Algorithm). The protocols used for Authentication are MD5 and SHA; and for Privacy, DES (Data Encryption Standard) and AES (Advanced Encryption Standard) protocols can be used.

Active Directory Credentials

(blue star) How you can find out the name and IP address of the AD domain controller on your network in Linux?

(blue star) How do I get to Active Directory on Mac?

(blue star) How do I get to Active Directory on Windows?

Exclude IP

Master Credentials

  • The Master credentials section will be used to do an authenticated asset scan and find vulnerabilities, without going by updating the credentials for each asset. Here a common set of credentials for OS like Windows, Mac, and Linux can be used.

  • Azure AD assets can be scanned by adding Master credentials and setting up network share access.

Prerequisites for Master Credentials:
(blue star) Windows machine
1. SMB should be enabled (port: 445)
(blue star) Linux based OS
1. ssh access should be enabled for the end machine (asset).
2. The user should have sudo privileges on the asset.
3.User should have access to the sudo command without a password.
(blue star) Darwin-based OS(MAC)
1. ssh should be enabled in the endpoint machine.
2.User should have sudo privileges.
3.User should have access to the sudo command without a password.
(blue star) VMware based OS
1. ssh should be enabled in the endpoint machine.
2. User should have access to the sudo command without a password.

To scan Azure AD Assets:

Azure AD users can not access a local network share directly. If they have a local Active Directory and it is connected to the Azure AD using Azure Connect, then users will sync with Azure AD and the local AD post which they can access ADMIN$.

For Granting permissions to Azure AD users for local network share:

You must install and configure an Azure AD Connect

After that, you must join your VM in Azure to the Domain Controller.

And finally set a user from your domain controller.

Performance Management

  • This tab allows you to allocate the required number of processes to be executed at a time when a scan is triggered to manage the performance of the scans and the systems.

  • This is based on the system configuration on which the CyberCNS agent is installed.
    (Ex - 4 Core Processor - 16 Processes)

Brute Force Settings

By implementing this setting, the security posture can be strengthened of the system for brute force attacks, potentially safeguarding user accounts and sensitive information.

Uninstall Probe/Agents

CyberCNS allows uninstalling agents from this section only if the agents are showing online from the CyberCNS portal.

  1. The CyberCNSAgentV2 folder must not exist on the system. Please delete it if it exists.

  2. Windows services cybercnsagentv2 and cybercnsagentmonitor should not be running and should not exist. If they exist, please stop the services and then delete them using the following commands

--> Open the command prompt, and Run as administrator.

--> sc.exe delete cybercnsagentv2

--> sc.exe delete cybercnsagentmonitor

Delete Probe/Agents

CyberCNS allows deleting the agents, even though the agents are online or offline. Once deleted, all the data about that Probe/Agent will be deleted from the CyberCNS portal.

Fetch Event Logs

This will help to fetch event logs from the system on which the agent is installed.

  • The maximum number of days to be selected is 10 days.

  • The start date and End Date are to be set with a difference of min a day.

For example:- Start Date → 19/04/2023 & End Date → 20/04/2023

Agent Update Info

Agent Update information log will help to fetch the information about the agent updation from the older version to the latest version.

Migrate to Lightweight Agent

Migration from Probe to Lightweight has the following changes:

  • All Assets discovered by the probe will be deleted, except for the probe itself.

  • Discovery Settings added to the probe will be deleted.

  • All credentials associated with the probe will be deleted.

  • Any job running on the probe machine will be terminated.

  • All pending jobs in the queue will be deleted.

Migrate to Probe

Migration from Lightweight to Probe has the following changes:

  • The agent type of assets will be updated.

  • The agent associated with the asset will be updated accordingly.

Deprecated Agent

  • Agent deprecation helps you clean up agents from the lists that are not reachable from the CyberCNS agent. Users can set the deprecation age as per requirement using Settings

  • Only the offline agents will move to the Deprecated Agent based on the deprecation age.

Global Level

Over companies agents will be listed in the Global view > Probes/Agents tab.

Only the offline agents will move to the Deprecated Agent.