Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • Create a Support Ticket
  • Partner Portal
  • CYRISMA MSP Dashboard
  • Home
  • The Cyber Risk Assessment Process

How To Create an Internal Authenticated Vulnerability Scan

Learn how to conduct internal authenticated vulnerability scans to improve the security of your organization's network infrastructure.

Written by Liam Downward

Updated at December 4th, 2024

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • User Manual
    Overall Risk Dashboard Agent Status Report Builder Data Scan Vulnerability Scan Secure Baseline Compliance Mitigation Dark Web MSP Interface Instance Admin
  • Self Onboarding Guide
  • Agents
  • The Cyber Risk Assessment Process
  • PSA Integrations
  • General Questions and Troubleshooting
    Agent Troubleshooting Scanning Troubleshooting
  • The Cyber Risk Assessment Process (Video Tutorials)
  • Sales and Prospecting Articles
  • CYRISMA Partner Portal Access
  • Glossary
  • API Documents
  • CYRISMA Change Log
  • Support Ticket SLA
  • Billing Questions
+ More
  1. Navigate to Schedule a Scan:
    • Go to Vulnerability Scan > Schedule a Scan in your dashboard.

  1. Name the Scan:
    • Enter a descriptive name for your scan, such as "VS_INT_Auth_1".

  1. Select Scan Type:
    • From the dropdown menu, choose "Internal - Authenticated".

  1. Choose Agent or Agent Group:
    • Select the desired agent for the scan. Alternatively, you can choose an agent_group to group your agents, allowing them to scan themselves for quick and efficient results. Note that this option is only available for agent-based scanning.

  1. Select Targets:
    • Choose the specific target(s) that you want to scan.

  1. Specify Credentials:
    • For the Credential To Be Used, you can either select the agent's designated credentials or opt for alternative credentials.

Schedule the Scan:

  • Choose when you would like the scan to run. You can also select the option to Notify When Complete and attach a report.

  1. Submit the Scan:
    • Once all settings are configured, click Submit to finalize and schedule the scan.

By following these steps, you can successfully set up an internal authenticated vulnerability scan tailored to your scanning needs.

internal vulnerability auth scan how to create how to create

Was this article helpful?

Yes
No
Give feedback about this article

Related Articles

  • Resolving CYRISMA Agent Issues with SentinelOne Security
  • How to Install the CYRISMA Agent for Windows
  • How to Install the CYRISMA Agent for Linux (Debian-based Kernel)
  • How To Create an External IP Scan

Partners
pax8
CDW
Stellar Cyber
RedSky Alliance

Request A Demo
Platform
  • Platform Overview
  • Resellers
  • Managed Service Providers
  • Request A Demo
  • Platform Overview
  • Resellers
  • Managed Service Providers
  • Request A Demo
Resources
  • Case Studies
  • White Papers
  • Videos
  • Blog
  • Press Release
  • Events
  • Case Studies
  • White Papers
  • Videos
  • Blog
  • Press Release
  • Events
Contact Us
Address: 510 Clinton Square, Rochester, New York, USA, 14604

Email: info@cyrisma.com

Phone: 1-585-620-2496

Easiest To Do Business With Summer 2023
Category Leader Channel Program
Capterra
Software Advice

Terms of Use          Privacy Policy

Copyright © 2024 – Data Spotlite, Inc All rights reserved.
Expand