In USM Anywhere you can run
An authenticated scanAuthenticated scans are performed from inside the machine using a user account with appropriate privileges. verifies scanned IPs and detects vulnerabilities, configuration issuesAn identified configuration of software deployed, or features of software in use, which is known to be insecure., and software. The USM Anywhere SensorSensors are deployed into an on-premises, cloud, or multi-cloud environment to collect log and other security-related data. This data is normalized and then securely forwarded to USM Anywhere for analysis and correlation. initiates a credentialed SSHProgram to securely log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another through SCP. (Linux) or WinRM (Windows) connection to the assetAn IP-addressable host, including but not limited to network devices, virtual servers, and physical servers. and remotely runs a series of commands for host-based assessment. See Managing Credentials in USM Anywhere. You can run authenticated asset scans from the following pages
- ENVIRONMENT > ASSETS for running an authenticated scan in that precise moment. For instructions, see Running Authenticated Asset Scans
- ENVIRONMENT > ASSET GROUPS for running an authenticated asset groups scan in that precise moment. For instructions, see Running Authenticated Asset Groups Scans.
- SETTINGS > SCHEDULER for scheduling an authenticated scan job during a specific period of time. For instructions, see Scheduling Authenticated Asset Scans and Scheduling Authenticated Asset Group Scans
- ENVIRONMENT > VULNERABILITIES for running an asset scan. You can scan a single asset, an asset group, or enter a network range. For instructions, see Running an Asset Scan from Vulnerabilities.
Warning: Keep in mind that an authenticated scan may fail if the local mail exchanger, which applies to Linux hostsReference to a computer on a network., is enabled in the target asset.
Warning: You cannot scan USM Anywhere sensors.
Use an asset scan to discover services, operating systemsSoftware that manages computer hardware resources and provides common services for computer programs. Examples include Microsoft Windows, Macintosh OS X, UNIX, and Linux., hostnamesA hostname is a label that is assigned to a device connected to a computer network and is used to identify the device on the network., IP and MAC addressesA unique numeric value assigned by the manufacturer to identify a specific network device or computer, which allows communication over networks. Note that a device’s MAC address can be manipulated., and vulnerabilities of known hosts in the deployed network. You can run non-authenticated asset scans from the following pages
- ENVIRONMENT > ASSETS for running an asset scan in that precise moment. For instructions, see Running Asset Scans.
- ENVIRONMENT > ASSET GROUPS for running an asset group scan in that precise moment. For instructions, see Running Asset Groups Scans.
- SETTINGS > SCHEDULER for scheduling an asset scan job during a specific period of time. For instructions, see Scheduling Asset Scans and Scheduling Asset Group Scans.
- Navigate to ENVIRONMENT > VULNERABILITIES.
- Click New Scan.
- Select the asset(s) you want to scan
- Single Asset. You need to enter the name of the target you want to scan or select it from a list of your targets.
- Asset Group Name. You need to enter the name of the asset groupAsset groups are administratively created objects that group similar assets for specific purposes. you want to scan or click Select from List for selecting it from a list of your asset groups.
- Network ranged. You need to enter the network range you want to scan.
- Click Next.
- Click Create New Credentials for creating a credential and/or click Assign Credentials for assigning credentials to the assets/devices you want to scan. See Managing Credentials in USM Anywhere for further information.
- Click Select Another Target if you want to come back.
- You can select the target(s) to scan if you have more than one.
- Click Start Scan.
- Click Continue Scanning And Close.
- Click Refresh Scan Results to update the list.
The scan starts. Depending on the selected asset, the scan can last several minutes. When the scan finishes, you can see the status and if the scan found vulnerabilities. If you want to view the results of your scan, you need to go to the asset details page, see Viewing Assets Details.
While the scan is running, a Scanning button shows. When the scan finishes, the message Scan finished. Refresh to view scan results displays.