Skip to main content
Skip table of contents

Scan Policies



Purpose

This document describes how to set up Scan Policies through the Common Portal.

Introduction

Scan policies describe the technical parameters of a scan including port scan settings, network port specific settings and checks that should run.

Policy Settings

Scan Policies outline the settings that are used when running the Vulnerability Assessment against assets. They do not control which assets get scanned or when, but rather focus on how the scan should be performed.

When configuring a scan both a scan policy and a override scan policy can be selected, this means that the bulk of the configurations can be done in one policy and then have another policy that just changes the ports or credentials that is only applied to a specific subset of targets.

To facilitate this each setting in the scan policy has a toggle associated with it, which determines whether that setting is applied to the scan or not.

The way this works is that any setting that does not have the toggle will inherit from the underlying policy. for this the flow would be like this

  1. Default settings from the system.

  2. Settings in the configured scan policy which have the toggle enabled

  3. Settings in the override scan policy which have the toggle enabled.


Example

If you have not configured TCP-ports in any of your scan policies the system default is used.
If port 22-122 is configured in your scan policy the ports 22-122 is used.
If port 22-122 is configured in your scan policy and port 10-50 in your override scan policy port 10-50 is scanned.

However, if port 22-122 is configured in the scan policy, and a ssh credential is configured in the override policy, both settings will have effect and port 22-122 is scanned and with a credential configured.



OptionDescription
Built inPolicies that are included by the vendor.
CreatedTime past since policy was created.
Created byWho created the policy.
Customer IDCustomer identification number.
IDPolicy identification number.
NameName of the policy.
TagsTags connected to the policy. See Tags for more information about tags.

Updated

Time past since policy was updated.
Updated byWho updated the policy.


Creating a Policy

In the portal menu

  1. Click Configuration.
  2. Click Scan Policies.
  3. Click the green (plus) icon in the bottom right corner on screen to open the settings view to create a new policy.



  4. Fill in the settings for the policy and press the blue SAVE button in the lower right corner.
    The new policy is marked with a red NEW badge.


Settings

This are the general settings that control aspects of the scan not otherwise categorized.

General Settings

Name of the policy. The name field is mandatory and require an input to save the policy.


Safe checks only

Enabling unsafe vulnerability checks allows the scanner to perform checks which may potentially damage data or disrupt services on the remote host.

  • Safe checks only
  • Include unsafe checks


Try Default credentials

Perform login attempts through all protocol, such as SSH, SMB, POP3 using default credentials.


Filter out fallback kernels

Only use the current kernel version when finding vulnerabilities.


Limited authenticated assessment with found credentials

Perform a limited authenticated scan against the target (over SSH and/or SMB) using found default credentials.


Virtual hosts

  • Add IP as virtual host
  • Add hostname as virtual host
  • Add reverse DNS as virtual host


Port Scan

Port scanning is a technique used to identify open ports and services running on a networked device or server. A port scan involves sending packets of data to a range of ports on a target device and analyzing the responses received. If a port responds, it indicates that a service is running on that port. By analyzing the type of service and its version number, an attacker can identify vulnerabilities and potential attack vectors.

Port scan speed

Select from:

  • Normal
  • Fast
  • Very fast

TCP port range

Enter the port range you would like to scan in the following format: 443,-250,65000-,110-143,!80

The above would translate into scanning ports 443, 1-79, 81-250, 65000-65535 and 110-143. Valid keywords to put into this field are def and none.

It is also possible to exclude specific ports by adding a ! followed by the port number.

The default value for this field is def, which instructs OUTSCAN to perform a port scan on its default list of TCP ports. This default port list contains approximately 5500 TCP ports.


UDP port range

Enter the port range you would like to scan in the following format: 443,-250,65000-,110-143,!80

The above would translate into scanning ports 443, 1-79, 81-250, 65000-65535 and 110-143. Valid keywords to put into this field are def and none.

It is also possible to exclude specific ports by adding a "!" followed by the port number.

The default value for this field is def, which tells OUTSCAN to port scan its default list of UDP ports. The default port list contains approximately 100 UDP ports.

Warning

Scheduling large amounts ports in UDP scanning will have an affect on the overall scan time. Roughly it can take about an hour per 20.000 ports in best case.


Authenticated Portscan

Use authenticated details when determining if ports are open on the device. The quick option will utilize the open port details without a verification scan to confirm that the ports are really open. The verify option will port scan the authenticated details to determine that the port actually is available externally on the device.

Select from:

  • Off
  • Quick
  • Verify

Fallback to normal port scan

Fallback to normal port scan if no ports are found using authenticated port scan.

SSH port

From which open port (if multiple) is the port details used in the scan gathered.

Trust

Transport Layer Security (TLS) is a cryptographic protocol that provides secure connection with the website's server using a digital certificate. A trusted Certificate Authority (CA) is recognized by your web browser and operating system as a legitimate and trustworthy organization. When connecting to a website using HTTPS, it checks the digital certificate presented by the website against a list of trusted CAs. If the digital certificate is issued by a trusted CA, a secure connection with the website is established.

TLS Trusted CA

Enabling the TLS Trusted CA requires you to provide a certificate file in PEM format.

Credentials

This settings refers to authenticated scans with provided credentials and associated controls.

Enable Remote Registry

Enable remote registry for duration of scan over SMB

Use Custom Credentials

Custom credentials selects credentials from the available SSH and SMB credentials.

To create SSH and SMB, see SSH Credentials and SMB Credentials document.

Selected Credentials

The selected credentials for the specific policy are listed and can be removed clicking the bin icon.


Adding a Tag to the Policy

Tagging allows to group and filter data based on a user-defined value.

To add a tag to the policy:

  1. Select the policy by checking the box on the left hand side



  2. At the bottom, click the Edit tags icon,



    or right click and select the Edit tags icon from the context menu.



  3. Name a new tag and click (plus) to add the new tag or select one from the drop-down menu.



  4. Press the blue SUBMIT button to save the tag.



  5. The tag is added to the policy under the Tags column.

For more information on managing tags, see Tags.

Removing a Tag

To remove a tag, click the X on the right hand side of the tag.


For more information on managing tags, see Tags.

Deleting a Policy

To delete a Policy:

  1. Select the policy by checking the box on the left hand side.



  2. Click the Bin icon in the lower right corner of the screen,



    or right click the policy you want to remove and click Delete in the context menu.



  3. Click the red DELETE button in the verification view to remove the policy.


Related Article





Copyright

© 2024 Outpost24® All rights reserved. This document may only be redistributed unedited and unaltered. This document may be cited and referenced only if clearly crediting Outpost24® and this document as the source. Any other reproduction and redistribution in print or electronically is strictly prohibited without explicit permission.

Trademark

Outpost24® and OUTSCAN™ are trademarks of Outpost24® and its affiliated companies. All other brand names, product names or trademarks belong to their respective owners.





JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.