Skip to main content
Skip table of contents

Network Host Assessment

Purpose

This document describes how to set up a Network Host Assessment scan.

Introduction

The Network Host Assessment is the process of identifying and evaluating the security risks and vulnerabilities within individual network hosts, such as servers, workstations, or network devices. The goal of a network host assessment is to identify potential security weaknesses and remediate them before they can be exploited by attackers.

A Network Host Assessment identifies the operating system and software applications installed on the host and assesses their vulnerability to known exploits and attacks. The assessment also evaluates the configuration of the host, including the security of network services, access controls, and patch levels. Configuration errors or misconfigurations can create security vulnerabilities that can be exploited by attackers.

The results of the assessment can be used to prioritize vulnerabilities and develop a plan for remediation that includes applying security patches, reconfiguring access controls or network services, or implementing additional security controls such as intrusion detection or prevention systems.

It is important that network host assessments are performed regularly, as new vulnerabilities can be introduced as software is updated or new applications are installed.

When targeting an asset, the newest Asset Identifier is selected to be resolved, if the Asset Identifier is not a hostname, the newest IP number is selected.

Setting up a Network Host Assessment

Requirements

Before initiating the Network Host Assessment, it is recommended to perform a discovery scan to gain an overview of the organization's IT assets. For additional information, refer to: Network Discovery.

Set up

  1. Select Network host assessment.

    Portal_Scan_Configurations_Netsec_Assessment.png
  2. Fill in the Name input field with a descriptive name for the intended assessment. 

  3. Select Policy from the drop-down menu. To create a new scan policy, refer to: Scan Policies.

  4. Optionally, select an Override scan policy from the drop-down menu. For a more detailed description of this parameter, refer to: Policy Settings.

  5. Toggle the Scanning-Less Scanning switch button to enable or disable this option. For a comprehensive understanding of this feature, refer to: Scanning-Less Scanning.

  6. Click on the blue Add button in the lower right corner to add the configuration.




Copyright

© 2024 Outpost24® All rights reserved. This document may only be redistributed unedited and unaltered. This document may be cited and referenced only if clearly crediting Outpost24® and this document as the source. Any other reproduction and redistribution in print or electronically is strictly prohibited without explicit permission.

Trademark

Outpost24® and OUTSCAN™ are trademarks of Outpost24® and its affiliated companies. All other brand names, product names or trademarks belong to their respective owners.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.