Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • Create a Support Ticket
  • Partner Portal
  • CYRISMA MSP Dashboard
  • Home
  • The Cyber Risk Assessment Process

How To Create an Internal Unauthenticated Vulnerability Scan

Learn how to conduct internal unauthenticated vulnerability scans to identify potential security weaknesses within your organization's network.

Written by Liam Downward

Updated at May 21st, 2025

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • User Manual
    Overall Risk Dashboard Agent Status Report Builder Data Scan Vulnerability Scan Secure Baseline Compliance Mitigation Dark Web MSP Interface Instance Admin
  • Self Onboarding Guide
  • Agents
  • The Cyber Risk Assessment Process
  • PSA Integrations
  • General Questions and Troubleshooting
    Agent Troubleshooting Scanning Troubleshooting
  • The Cyber Risk Assessment Process (Video Tutorials)
  • Sales and Prospecting Articles
  • CYRISMA Partner Portal Access
  • Glossary
  • API Documents
  • CYRISMA Change Log
  • Support Ticket SLA
  • Billing Questions
+ More
  1. Navigate to Schedule a Scan:
    • Go to Vulnerability Scan > Schedule a Scan > Create.

  1. Name the Scan:
    • Enter a descriptive name for your scan, such as "VS_INT_UnAuth_1".

  1. Select Scan Type:
    • Choose the "Internal - Unauthenticated" option.

  1. Choose Agent:
    • Select the desired agent for the scan. Typically, it is recommended to run this from a server.

To ensure full scan coverage and accurate vulnerability results, Internal Authenticated Vulnerability Scans require selecting an Agent Group.

The Agent Group enables each agent to use local machine credentials to scan its own system.

This setup ensures that vulnerabilities are properly detected on each target machine.

If no Agent Group is selected, the scan may run without the necessary credentials—resulting in incomplete or missing findings.

 

 


  1. Enter Internal IP:
    • Input the internal IP address in the designated field, using the appropriate subnet (e.g., /24). To find your private IP, open a command prompt and type ipconfig.

  1. Schedule the Scan:
    • Choose when you would like the scan to run and select the option to Notify When Complete.

  1. Submit the Scan:
    • Once all settings are configured, click Submit to finalize and schedule the scan.

By following these steps, you can efficiently set up an internal unauthenticated vulnerability scan to assess your network's security posture.

unauthenticated scan create vulnerability internal how to

Was this article helpful?

Yes
No
Give feedback about this article

Related Articles

  • How to uninstall the CYRISMA Agent
  • How to Install the CYRISMA Agent for Windows
  • How to Install the CYRISMA Agent for Mac OS
  • How To Generate a Cyber Risk Assessment Report

Partners
pax8
CDW
Stellar Cyber
RedSky Alliance

Request A Demo
Platform
  • Platform Overview
  • Resellers
  • Managed Service Providers
  • Request A Demo
  • Platform Overview
  • Resellers
  • Managed Service Providers
  • Request A Demo
Resources
  • Case Studies
  • White Papers
  • Videos
  • Blog
  • Press Release
  • Events
  • Case Studies
  • White Papers
  • Videos
  • Blog
  • Press Release
  • Events
Contact Us
Address: 510 Clinton Square, Rochester, New York, USA, 14604

Email: info@cyrisma.com

Phone: 1-585-620-2496

Easiest To Do Business With Summer 2023
Category Leader Channel Program
Capterra
Software Advice

Terms of Use          Privacy Policy

Copyright © 2024 – Data Spotlite, Inc All rights reserved.
Expand