Skip to main content
Skip table of contents

Create Targets

Purpose

This document describes how to create targets.

Introduction

The Target Groups grid is used to organize targets. Targets are the assets that can be managed in the system.

Targets are added under the Manage Target section, which is accessible either using the icon on the desktop of from the menu at the bottom left of the GUI.

There are three generic ways to add targets to the system. Two of those can be performed from this section and the third is to conduct a Discovery Scan and thus that functionality is tied to the scheduling section discussed later in this document.

Icon List

Icon

Name

Description

New

Clicking New opens the Add New Targets window. The newly created targets will belong to the currently selected target group. 

Show Groups

Show all target groups in which this target has been added to.

Audit Log

To see the changes made to a certain entry, right click on it and select Audit log. This show a dialog with all the changes made to the object that were made by you or one of the users that you administrate.

Lookup

Filter the target group grid.

Delete

Clicking Delete while having any targets selected deletes them from the system. Multiple targets can be selected for deletion by holding shift while selecting the targets.

Reports for the selected targets are not deleted.

Edit

To edit a target, right-click on it and select Edit. This allows you to set the Hostname, MAC Address, label the systems importance which is used to calculate CVSS scores, and set Virtual host, hidden URLs. It also includes settings to set target to override scan policy.

Export

To export data from the grid, right click on any entry and select either to export it as HTML or CSV (comma separated values) in the sub menu. This gives you either a HTML page or a CSV file with data that you can save or copy data from.

Settings

Global settings for Target Management

Scan

Create a scan schedule for the target group.

Label Target, Update from ServiceNow, Set Policies on Target

By right-clicking on a target you can choose to update specific labels or attributes on the target.

Show Scanner, Set Scanners on Targets

Lists or set scanners on targets groups.

Refresh

Refresh the grid

Label Targets,Update from ServiceNow, Set Policies on Targets

By right-clicking on a target group you can choose to update specific labels or attributes on the targets in that group.

Set Target Authentication

Select available authentication from a drop down menu

Column Menu

To add or remove columns, hover the mouse over any column name and click the down pointing arrow.

Managing Targets

Create a New Target

To create a target:

  1. Open the Manage Targets module in Main Menu > Netsec > Manage Targets.

  2. Click on + New in the Targets field to display the Add New Targets window.

    MgnTrgt02.png

Format

Description

fc00::23

IPv6

192.168.200.23|virtualhost,virtualhost

IPv4

192.168.200.1/24

CIDR

192.168.200.3-192.168.200.15

IP range

host.domain.com

FQDN

\\netbios_host

netBIOS hostname

  1. Fill in the required information in the form fields and click Save.

Targets can also be imported from a Comma Separated Values (csv) file, LDAP/AD, or ServiceNow by clicking on respective Import/Upload button.

Option

Description

New Target List

Add one or multiple targets using the presented help text.

Private IP addresses cannot be added when using OUTSCAN.

DNS Lookup

Select if a DNS look-up should be performed when adding the IP addresses to the system to get the host name in the system.

NetBIOS Lookup (HIAB only)

Select if a NetBIOS look-up should be performed when adding the IP addresses to the system to get the host name in the system.

Scanner

(HIAB only)

Set which scanner that should scan the defined targets. Default is set to local and that is referring to the machine that you are logged on to. If you have a distributed network with multiple scanners that is accepted by the scheduler, you will be able to choose which scanner to use in the drop-down menu. If you have a HIAB External license, the OUTSCAN scanner is also available in the drop-down and should be used if public IPs are to be scanned from the OUTSCAN SaaS solution.

Attributes

This option is used to add additional information about the target. This is displayed as a column with the given field name in the Managed Targets grid.

Upload From File

Import a previously exported target group file or custom Comma Separated Values (csv) file.

Import from LDAP/AD

Import targets from LDAP/AD.

Import From ServiceNow

Import targets from ServiceNow.

Certain tasks like adding a large/multiple networks can take a long time. When it takes more than 90 seconds, the progress can be viewed in the Task Viewer tab located at the bottom right of the task bar. Task Viewer appears for a user only if  there is at least one task in the list. The three possible states for a task appearing in Task Viewer are:

  • In Progress

  • Done

  • Error

Import from LDAP/AD

The Import from LDAP/AD button displays a window where you can select which targets to import into the HIAB.

Option

Description

Search Filter

Standard LDAP search filter. See Search Filter Syntax on Windows Dev Center for more information.

Import From ServiceNow

The Import from ServiceNow button displays a window where you can select which targets to import into the HIAB from ServiceNow.

Import From ServiceNow

Option

Description

Table

Table name containing the targets in ServiceNow.

Tag

Tags are text labels in ServiceNow associated with items such as records and pages.

Asset Tag

The Asset tag refers to assets in ServiceNow Asset Management system.

Query

Search query to retrieve the ServiceNow targets.

Upload From File

Adding targets from a CSV-file.

  1. Click the + New button in the Targets view.




  2. Click the Upload From File button.



  3. Import the exported target group file or custom Comma Separated Values (csv) file by clicking the + button to select a file.

    Add New Targets Upload.PNG

Option

Description

Upload From File

Select a file to import.

Separator

Define what separator is used in the file.

  • Tab

  • Comma ( , )

  • Semicolon ( ; )

  • Colon ( : )

Text Delimiter

Define what text delimiter is used in the file.

  • Single Quote ( ' )

  • Double Quote ( " )

Skip First Line

Select this to skip the first line.
Ex. for a header line.

  1. Click Next to continue.

  2. Once uploaded, continue with mapping the files information to the target by selecting the appropriate subject in the drop-down menus.


  3. Finish by clicking the Save button.

Inspecting and Editing Targets

Once targets have been added into a group it will look like this.

Some of the columns does not get populated until the target has been scanned.

Manage Targets

To add or remove columns, hover the mouse over any column name and click the down pointing arrow Icon_Column_Menu.png . Click Columns and select the columns you wish to add to the grid:

Columns

Options

Description

Agent ID

The Agent universally unique identifier (UUID). If blank, the agent has passed its end of life and should be updated.

Agent Last Synchronized

The last date when agent called home.

Agent Last Version

Agent Last Version column shows a boolean Yes or No when an O24 agent is installed on the target and respectively matches or does not match the last available agent version.

Agent Version

Current version of the agent. If blank, the agent has passed its end of life and should be updated.

ARN

The Amazon Resource Name, used to find Amazon Web Services targets during scanning.

Authentication

Flag if authentication is defined on this target.

Authentication Result

The last results of when the authentication where used.

Availability

The targets availability, used for CVSS score calculation.

Business Criticality

This attribute describes how important the target is.

  • low

  • medium

  • high

  • critical

Call home frequency (minutes)

Agent call home frequency. The agent call home frequency depends on the amount of agents that is deployed. When setting up an agent for the first time, the agent call home frequency is set to one hour, but is recalculated after enrollment to avoid overloading the agent server when deploying large amounts of agents.

CD Potential

The targets collateral damage potential, used for CVSS score calculation.

Confidentiality

The targets confidentiality, used for CVSS score calculation.

Exposed

This attribute can be set to determine if the target is exposed to the internet or not. It is automatically set for certain IP ranges but can be changed later.

Hidden URLs

A list of hidden URLs for the web app scanner to crawl. Hidden URLs are URLs that cannot be reached by crawling the default address.

Host Name

The targets host name.

Instance ID

Instance ID for Amazon Web Service targets.

Integrity

The targets integrity, used for CVSS score calculation.

IP Address

The IP address of the target.

Last Discovery Date

The last date the IP was detected in a discovery scan.

Latest Scan Date

The most recent date that a scan was run.

Latest Scan Status

Status of the most recent scan.

Latest Successful Scan Date

The date when the last successful scan was executed against this target.

MAC Address

The targets MAC address.

NetBIOS

The targets NetBIOS name.

Next Scan Date

The next date and time when this target will be scanned.

Override Scan Policy

Shows if the settings for the targets overrides the scan policy. This can be done by editing the target and setting specific scan settings for that target only.

Platform

The detected OS platform of the target.

Request Body Blacklist

Shows the request body blacklist for the target.

Scan Update Signature Available

Shows if there is a scan update signature available for the target.

Scanner (HIAB only)

Scans against the target will be executed by this scanner. Only visible when at least one scanner is registered.

Target Distribution

The targets distribution, used for CVSS score calculation.

URL Blacklist

Shows the URL Blacklist for the target.

Uses License

Shows if this target is using your license or not.

Virtual Host Names

Shows the hostnames of any virtual hosts.

Edit a Target

When right clicking on any target in the Target section the following menu are displayed:

Target Menu

Options

Description

Show Groups

Show all target groups in which this target has been added to.

Perform DNS lookup

To perform a DNS lookup on an individual target, right-click on the target and select Perform DNS lookup. This tries to determine the targets host name and store that information in the system.

Perform MAC Lookup
(HIAB only)

To perform a MAC lookup on the selected target, right-click on the target and select Perform MAC Lookup.

Perform NetBIOS lookup (HIAB only)

To perform a NetBIOS lookup on the selected target, right-click on the target and select Perform NetBIOS Lookup.

Label Targets

By right-clicking on a target you can choose to update specific labels or attributes on the target(s).

Update from ServiceNow

Update the target with information from ServiceNow.

Set Policies on Targets

Select policies for the target.

Scan

Create Scan Schedule for the selected target.
See Scan Scheduling on more information about creating a scan schedule.

New

Add a new target. See Create Targets.

Delete

Clicking Delete while having any targets selected deletes them from the system. Multiple targets can be selected for deletion by holding shift while selecting the targets.

Reports for the selected targets are not deleted.

Edit

To edit a target, right-click on it and select Edit Icon_edit.png. This allows you to set the Hostname, MAC Address, label the systems importance which is used to calculate CVSS scores, toggle the Exposed flag, and set Virtual host, hidden URLs. It also includes settings to set target to override scan policy.

Audit log

To see the changes made to a certain entry, right click on it and select Audit log. This show a dialog with all the changes made to the object that were made by you or one of the users that you administrate.

Export

To export data from the grid, right click on any entry and select either to export it as HTML or CSV (comma separated values) in the sub menu. This gives you either a HTML page or a CSV file with data that you can save or copy data from.

The CSV export function in the grid has a limit of 100k rows.

Show Scan Results

Shows latest scan results for this target in the Reporting Tools.

Remove from group

Clicking on Remove from group while one or more targets have been selected, removes them from the group.

To edit a target:

Right click on the specific target and select Edit Icon_Edit.png .

The Maintaining Target window is displayed.

In the top of the window you find the general information about the target that you are editing such as:

Options

Description

IP Address

The targets IP address

Hostname

The targets hostname

MAC Address

The targets MAC address

The field MAC-Address does not get populated until the target has been scanned.

Business criticality

The targets business criticality select from Low, Medium, High, or Criticality

Exposed

Toggle if the target is exposed on internet or not.

Scanner

Select scanner. Local or available scanners.

The following tabs are present in the Maintaining Target window:

WEB Settings
WEB Settings

Options

Description

Virtual Hosts

If there are one or multiple virtual hosts on the target, you can add them here.

Up to 10 virtual hosts can be defined per target.

Hidden URLs

Add URLs that cannot be crawled from the default site. URLs that are added here will be crawled separately.

URL Blacklist

Add URLs that you would like the scanner NOT to scan. Most common blacklisted URL is the site’s logout URL to prevent the scanner from logging itself out.

Request Body Blacklist

Add body blacklists.

CVSS Score

Use the drop-down menus in this tab to evaluate the impact of a security breach on the target. Grade the availability, integrity,  confidentiality, along with the Collateral Damage Potential and this will be considered when the CVSS score is being set. This is done to personalize the CVSS scores as some targets are more valuable than other.

CVSS_Score_tab.PNG

 

Attributes

This tab is only displayed if the user has one or more custom attributes configured to be shown in Targets. This is to add the ability to add additional information about the target.

Target attributes can be set in Main Menu > Settings > Account > Attributes tab.

See Attributes for information on how to add personal attributes columns.

Attributes
Override Scan Policy

This tab will give you the ability to set what vulnerabilities will be searched/not searched for on this target. This will override the scan policy used for the scan of this target.

For more information about scan policies, see Scan Scheduling document.

Override Scan Policy
Authentication

Use this tab to fill in information that will help the scanner to authenticate against the target every time it gets scanned. Authentication allows the scanner to access registry keys and perform sudo-commands which greatly increases the scan accuracy. 

SSH

See Authenticated Scanning using SSH for more information.

SSH Authentication
SMB

Contains the authentication settings and credentials used to enable Authenticated Scanning using SMB.

For more information, see Authenticated Scanning using SMB.

SMB Authentication

Option

Description

SMB domain

The SMB domain to use when scanning the remote host. 

SMB allow NTLMv1

Whether to allow authentication using NTLMv1. 

SMB username

The username to use when attempting to log on to the remote host via SMB. 

SMB password

The password to use when attempting to log on to the remote host via SMB. 

Enable remote registry

If this option is checked, the scanner starts the Remote Registry Service using the provided user details and once finished, disable the service again. 

vSphere

Contains the authentication/configuration settings for the VMware vSphere. If configured, they are used when scanning targets running this service.

vSphere credentials are only used if a compliance scan is running. In addition, the target must have a ESXI compliance policy enabled.

vSphere Authentication

Option

Description

vSphere username

The username to use when attempting to log on to vSphere.

vSphere password

The password to use when attempting to log on to vSphere.

Ignore certificate validation

Allows the authentication and operations to continue even if the vSphere certificate is not valid.

CyberArk SSH

Contains the authentication settings and credentials used to enable Authenticated Scanning using CyberArk SSH.

See Integrations for more information.

CyberArk SSH Authentication

Option

Description

Username

Provide your username to authenticate against CyberArk Server.

Object name

Check your CyberArk Vault administrator and provide the object name.

Override safe

Provide a different safe name in case you wish to override the existing safe name.

Override folder

Provide a different folder name in case you wish to override the existing folder names.

CyberArk SMB

Contains the authentication settings and credentials used to enable Authenticated Scanning using CyberArk SMB.

See CyberArk SMB for more information.

CyberArk SMB Authentication

Option

Description

Username

Provide your username to authenticate against CyberArk Server.

Object name

Check your CyberArk Vault administrator and provide the object name.

Override safe

Provide a different safe name in case you wish to override the existing safe name.

Override folder

Provide a different folder name in case you wish to override the existing folder names.

SMB domain

The SMB domain to use when scanning the remote host. 

SMB allow NTLMv1

Whether to allow authentication using NTLMv1.

Enable remote regestry

If this option is checked, the scanner starts the Remote Registry Service using the provided user details and once finished, disable the service again. 

Thycotic SSH /SMB

Contains the authentication settings and credentials used to enable Authenticated Scanning using Thycotic SSH or Thycotic SMB.

See Thycotic for more information.

Thycotic SMB Authentication
Thycotic SSH Authentication

Option

Description

Thycotic Config

Select the config from the drop-down list.

Secret name

Provide the name of the Secret. 

When the user provides a phrase, it searches for the name matching the given phrase. The first name matched is used. ${IP} will get replaced by the target IP.  ${HOSTNAME} will get replaced by the host name of the target.

When the user provides a phrase, it searches for the name matching the given phrase. The first name matched is used. ${IP} will get replaced by the target IP.  ${HOSTNAME} will get replaced by the host name of the target.

Override path

Provide a new path to cancel using the existing path.

SSH substitute user command

The use of the following commands is to execute commands with a different user/privilege escalation.

  1. sudo: This command is found in most of the Linux based systems (or can be installed). Used to execute commands as a different user (other than the one used to log in). From the tools perspective, it uses root account to perform the commands.

  2. doas: It is an OpenBSD based command. 95% of its features are like sudo. https://man.openbsd.org/doas

  3. sesu: It is an IBM implementation of su.

  4. dzdo: Used in Linux/Unix (can be installed at will). An alternative to sudo.

  5. pfexec: Mostly used in Solaris.

  6. custom: It gives a flexibility to use a custom defined privilege escalation command. 

SSH custom user command

This field is available when the user selects custom in the SSH substitute user command field. Add a custom command for escalating privilege.

SMB allow NTLMv1

Check this box to enable the authentication using NTLMv1.

Enable remote registry

If enabled, the scanner initiates the Remote Registry service with the given details. Disable the service when the scan is finished.

Compliance Scanning

The Compliance Scanning tab is available if you have a Compliance Scanning license.

The policies for the Compliance Scanning can be set only through Maintaining Scan Schedule window. Refer to Scan Scheduling guide for detailed information.

Compliance Scanning
Databases

Use this tab to fill in information that will help the scanner to authenticate against a database on the target. This is only used when running a compliance scan and if a SQL database has been defined.

Databases Tab

The settings for the database targets can be edited by right-click a database and and select edit in the menu.

Databases Setting

Option

Description

Type

Select one of the database types from the drop-down menu:

  • PostgresSQL

  • MySQL

  • DB2

  • Oracle

  • MS SQL

Database

Name of the database.

Port

The port number database connector is using to communicate.

Username

The username used to authenticate against external database server.

Password

The password used to authenticate against external database server.

Label Targets

  1. Right click the target.

  2. Select Label targets in list.

  3. Select labels from drop-down menus.

    Label Targets.png

Note that the checkbox to the left of the drop-down must be checked for the value to be set.

Option

Description

Exposed

Yes/No

Business criticality

Low, Medium, High , Critical

Collateral Damage Potential

Not Defined, None, Low, Low-Medium, Medium-High, High

Security Requirements - Availability

Not Defined, Low, Medium, High

Security Requirements - Integrity

Not Defined, Low, Medium, High

Security Requirements - Confidentiality

Not Defined, Low, Medium, High

Target distribution

Not Defined, None, Low, Medium, High

  1. Click Save.

Scanning a Target

To set up a scan schedule from a single target:

  1. Go to Main Meny > Netsec > Manage Targets.
  2. Select the target you want to scan
  3. Right click a target and select Scan
  4. In the Create Scan Schedule window, fill in:

    OptionDescription
    NameName of the schedule.
    Scan Mode

    Select scan mode:

    • Scan
    • Discovery
    • Discovery/Scan
    Scan PolicyScan Policy enables you to configure each scan to suit your network environment.
    See Scan Policy section on how to create Scan Policies.
    Scanning FrequencyScanning Frequency defines how often the scan schedule should run.
    Next ScanDisplays the date of the next scan (if scheduled).
    Use Global Ignore ListThe Global Ignore List is a default ignore list of targets that is excluded from scanning.
    See Global Settings section on how to create a Global Ignore Target List.




Copyright

© 2024 Outpost24® All rights reserved. This document may only be redistributed unedited and unaltered. This document may be cited and referenced only if clearly crediting Outpost24® and this document as the source. Any other reproduction and redistribution in print or electronically is strictly prohibited without explicit permission.

Trademark

Outpost24® and OUTSCAN™ are trademarks of Outpost24® and its affiliated companies. All other brand names, product names or trademarks belong to their respective owners.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.