/
Setup the scope for Vulnerability Scan
Setup the scope for Vulnerability Scan
Once the agent installation is complete, a window (localhost:9000) opens, where you can:
There are four modes to choose computers you want to scan
- Active Directory Service Account. This will list all computers on the network and you can choose the Computers you would like to scan
- Discover computers by IP Range
- Add a specific computer or device
- Import from CSV
NOTE: localhost:9000 we will support in Chrome
Choose devices to scan
Range of IP Addresses
Discovery using Active Directory
Specific IP Address
Schedule the scans
Import CSV
Import a list of machines from a CSV file. In order for the scanner to see the file please copy the File to the credential directory under where the Vulnerability scanner is installed.
NOTE: C:\Program Files\Vulnerability-Scanner\credentials In this path you will be able to see the default csv where you can directly open and add the device details.
The Format of the CSV file as shown below.
Add more specific IP Addresses if you need and provide access credentials
Related content
CyberCNS Scan Types
CyberCNS Scan Types
Read with this
Getting Started
Getting Started
More like this
CyberCNS - Troubleshooting FAQs
CyberCNS - Troubleshooting FAQs
Read with this
Agent Configuration
Agent Configuration
More like this
Vulnerabilities
Vulnerabilities
Read with this
Netalytics Windows Agent
Netalytics Windows Agent
More like this