|Applies to Product:||USM Appliance™||AlienVault OSSIM®|
By default, USM Appliance runs vulnerability scan jobs without any authentication. They are less thorough and are most appropriate when you want a bird's-eye overview on your assets.
Note: Before scanning a public network space, see Addendum Notice Regarding Scanning Leased or Public Address Space .
Important: Threat intelligence update will not finish if any vulnerability scan is running, because the update needs to refresh the vulnerability threat database used by the scan.
To create a new vulnerability scan job
- Navigate to Environment > Vulnerabilities > Scan Jobs.
- Click New Scan Job.
- Identify the scan job by typing a name in the Job Name field.
Select a sensor from the Select Sensor list.
Important: You can only run up to 5 concurrent scans per USM Appliance Sensor.
Select a profile from the Profile list.
USM built-in vulnerability scan profiles Profile Name Description Deep A non-destructive full and slow scan. Default A non-destructive full and fast scan. Use this profile if the target system tends to break or crash with the scanning requests. Ultimate A full and fast scan including destructive tests. It includes stress tests that can crash the target system. For example, filling a network switch with random MAC addresses.
For creating your own scan profiles, see Customizing Vulnerability Profiles.
In Schedule Method, do one of the following:
- To launch the scan without any delay, keep the default value as "Immediately".
To schedule the job to run at a different time, make a selection based on the table below.
USM Appliance vulnerability scan schedules Schedule Method Description Immediately Launch the scan job without any delay. Run Once Run scan once at the specified date and time. Daily Run scan every x days at the specified time beginning on the specified day. Day of the Week Run scan on the specified day and time of the week. Day of the Month
Run scan on the specified day and time of the month.
Nth week of the month Run scan on the specified day and time on the Nth week of the month. A week starts on the first day of the month and lasts 7 days.
(Optional) Click Advanced.
For authenticated scans, choose SSH Credential (UNIX/Linux) or SMB Credential (Windows), depending on the operating system of your hosts.
Note: Skip this step for unauthenticated scans. You need to create the credentials first. For assistance, see Creating Credentials for Vulnerability Scans.
Specify the maximum time (in seconds) that the scan should run.
In USM Appliance version 5.2 and earlier, the default is 28,800 seconds (8 hours).
In USM Appliance version 5.3 and later, the default is 57,600 seconds (16 hours).
- To send an email notification after the scan finishes, select Yes, and then select User or Entity as the email recipient.
(Optional, available in USM Appliance version 5.3.2 and later) Specify the port numbers you do not want to scan in Exclude Ports. Use comma to separate the port numbers but do not use any space between them. For example, "1,33,555,26-30,44".
Note: Using this option slows down the scan because USM Appliance performs additional tasks to exclude the ports you specify.
From the asset structure towards the right, select assets, asset groups, or networks to perform the vulnerability scan.
Important: Starting from USM Appliance version 5.3, any scan covering more than 3500 hosts will be split into multiple scan jobs automatically. For example, if you are trying to scan a /16 network that contains 65,536 hosts, it will result in 19 jobs (65,536 / 3500). Each USM Appliance Sensor can run up to 5 jobs simultaneously. You will see 19 reports after the scan has completed.
Alternatively, start typing the IP address and USM Appliance fills in the rest as you type. If you want to exclude a specific IP address, prefix your selection with an exclamation mark ("!"), which means do not scan that IP address.
- (Optional) To speed up the scanning process, click Only scan hosts that are alive.
- (Optional) If you do not want to pre-scan from a remote sensor, click Pre-Scan locally.
- (Optional) If you do not want to resolve hostnames or FQDN, click Do not resolve names.
- To create the vulnerability scan, click Save.