Last Updated: 2025-05-27
Purpose
This article describes how to set up an Authenticated Network Scan via credential.
Introduction
The Authenticated Network Scan in Outpost24 leverages provided SSH credentials to identify and enumerate assets within cloud environments. By querying the system's API, it retrieves asset identifiers such as serial IDs, disk IDs, product IDs, and associated IP, hostname, or MAC addresses. This method enhances the accuracy of asset discovery by providing detailed information that may not be accessible through unauthenticated scans. Using authenticated scans is particularly beneficial for comprehensive vulnerability assessments, as they offer a deeper insight into the assets' configurations and potential security risks.
Setting up an Authenticated Network Scan
Prerequisites
The Authenticated Network Scan requires root equivalent credentials.
Prepare a root account or a non-root account with sudo permission. With a non-root account, you need to add sudo as a substitute user command.
For more information, see SSH Credentials.
Limitations
When using Portal for Network scan, users can select multiple credentials when creating the policy, including several of the same type.
However, if multiple credentials with the same type are selected, only the first created credential is used. Not only for SMB, but also for SSH and VMware vSphere credentials.
Create and Run a Network Discovery
To perform a network scan, you need a specific asset to run the scan on.
To set up the asset a Network discovery scan needs to be performed.
-
Go to Portal > Configuration > Scan configurations
-
Click the
(green plus button) -
Select Network discovery.
-
Fill in a suitable name for the configuration.
-
Fill in the targets IP-address or FQDN.
-
Select a scanner in the drop-down list.
-
Click the blue ADD to create the Scan configuration.
-
Select the configuration you just created, and click the Scan now icon in the bottom toolbar to start the scan. Wait until the scan finished.
Tag the Asset
Add a tag to the asset found in Create and Run a Network Discovery for the scan policy to be created later.
-
Go to Portal > Assets > Assets.
-
Right click at the newly discovered asset, select Edit tags.
-
Type in a new tag and click Submit.
For more information, see Tags.
Create a Policy with Credential
Next step is to create a Scan policy.
-
Go to Portal > Configuration > Scan policies.
-
Click
(green plus button) to Create new scan policy. -
Enter the information for the policy:
-
In the Settings tab, enter a name for the policy
-
In the Portscan tab, toggle the SSH port to on.
-
In the Credentials tab:
-
Toggle the Use custom credentials to on.
-
Check Perform login with the selected credentials
-
Select SSH credential you created.
-
-
Create and Run a Network Scan
Now you can create a Scan configuration with the created policy and tags from the previous step, and then run it.
-
Go to Portal > Configuration > Scan configurations.
-
Click the green plus
button. -
Select Network host assessments.
-
Fill in a suitable name for the configuration.
-
Select scan policy you created in previous step.
-
Choose the asset tag you used in previous step.
-
Click the blue ADD to create the Scan configuration.
-
Select the configuration you just created, and click the Scan now icon in the bottom toolbar to start the scan. Wait until the scan finished.
Check the Result
Wait until the scan finished, check the result with created asset identifiers: serial machine/product/disk ids, hostname, IP, MAC
Related Articles
- Notifications
- Delta
- Solutions
- Accepting a Risk
- Getting Started with the Portal
- Licensing Consumption
- Column Configuration
- Filters
- Common Settings Panel
- Discussions and Commenting
- Managing Tags
- Tags
- View Templates
- Scan Configuration Settings
- Scan Credentials
- VMware vSphere Credentials
- SSH Credentials
- Account
- Change Instance Type on HIAB on Amazon Web Services
- Integrations
- CyberArk Integration
- Delinea Integration
- SNMP Integration
- Syslog Integration
- Webhook Integration
- Schedules
- Scans View
- Scan Policies
- Scan Assessment Configuration
- Discovery Scan Configuration
- Vulnerabilities
- Report Library
- Reports
- Identity and Access Management (IAM)
- Basic Credentials
- Assets
- Automatic Asset Joining With Netsec
- Asset Discovery
- HIAB Console
- HIAB Deployment Guide
- HIAB Enrollment
- Technical Specification
- Virtual HIAB Appliance
- HIAB Remote Support
- HIAB Setup Guide
- HIAB Server Settings
- HIAB Distribution Settings
- Scan Stages
- Scanning Range
- Using the Agent Info Command
- Updating the Agent
- Retrieving the Agent UUID
- Checking if Agent is Running
- Finding the Agent Version
- Retrieving Results From the Agent in OUTSCAN
- Discovering the Agent in OUTSCAN
- Removing an Agent from Windows
- Firewall Setup for Agents
- Checking if the Agent has Produced Results
- Setting Up an Agent Using System Proxy
- Agent Latest Version
- Agent Call Home
- Agent Introduction
- Configuring and Accessing the HIAB console using SSH
- HIAB Backup
- Firewall Rules
- HIAB Maintenance Settings
- HIAB Remote SSH Guide
- HIAB Restore
- HIAB Updates
- Container Inspection - Azure
- Integration Management
- Understanding Scanner and Scheduler
- Supported Browsers
- Check Connectivity to Agent Server
- API Examples
- Retrieving a REST API Token From XMLAPI
- REST API Interface Technical Document
- XML API Interface Technical Document
- Object Identifiers
- DNS Lookup in UI and in Console
- Scan Blueprint
- Scan Scheduling Errors
- Troubleshooting checklists
- Webhook Integration with OAuth v2
- Importing Tags for AWS Discovery
- Removing an Agent from Linux
- SMB Credentials
- Workflows
- Authenticated Network Scan
- Portal Integration with ServiceNow Incidents
- Read Agent Scan Result
- HIAB E-mail Whitelisting
- Event Notification - Use Cases
- Subscriptions Overview
- Notification Settings
- Converting Normal with Webapp Scans (Netsec) to Portal Workflows
- Scheduled Reports
- Marking as False Positives
- Vulnerability Database
- Installing a macOS Agent
- Generate Reports
- Event Notification - Integration
- Portal Icon List
- Network Discovery
- Network Host Assessment
- Agent Assessment
- Log In Using LDAP
- Log In Using Single Sign-On (SSO)
- Logging in to the Portal
- Hardening the HIAB
- PGP on User Accounts
- 2FA on User Accounts
- Resource Group Management
- Role Management
- User Management
- Webhook Integration with JIRA
- Webhook Integration with Microsoft Teams
- Products
- Certificates
- Ports
- Services
- Products Database
- General Information about SMB/WinRM Scanning
- Download Agents
- Agent Installation Introduction
- Installing a Linux Agent
- Installing a Windows Agent
- Managing Agents
- Checking Schedules from OUTSCAN in Agent