Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • Create a Support Ticket
  • Partner Portal
  • CYRISMA MSP Dashboard
  • Home
  • The Cyber Risk Assessment Process

How to use Network Discovery to find Targets

Learn how to leverage network discovery techniques to identify potential targets for your cybersecurity strategy efficiently and effectively.

Written by Liam Downward

Updated at November 20th, 2024

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • User Manual
    Overall Risk Dashboard Agent Status Report Builder Data Scan Vulnerability Scan Secure Baseline Compliance Mitigation Dark Web MSP Interface Instance Admin
  • Self Onboarding Guide
  • Agents
  • The Cyber Risk Assessment Process
  • PSA Integrations
  • General Questions and Troubleshooting
    Agent Troubleshooting Scanning Troubleshooting
  • The Cyber Risk Assessment Process (Video Tutorials)
  • Sales and Prospecting Articles
  • CYRISMA Partner Portal Access
  • Glossary
  • API Documents
  • CYRISMA Change Log
  • Support Ticket SLA
  • Billing Questions
+ More
  1. Navigate to Targets:
    • Visit Admin > Targets in your dashboard.

  1. Choose Network Discovery:
    • Select the Network Discovery option to start the process of scanning for available targets.

  1. Fill in the Details:
    • Enter the required information for the network discovery. Note that the agent must have admin credentials to access machines in the subnet being scanned.
    • Credentials can be provided during agent provisioning or when scheduling the scan by selecting the "Use Alternate" credential option.

  1. Schedule the Scan:
    • Set a schedule for when the network discovery scan should run.

  1. Review Scan Results:
    • Once the scan is complete, navigate back to Admin > Targets > Network Discovery.

View Detailed Results:

  • Click anywhere in the row of your network discovery to see the results displayed below.

  1. Update Agent Credentials if Necessary:
    • The agent service runs as "system" with local system rights. Depending on local network rights, this "system" account may not have permission to access remote machines.
    • If access is denied, edit the Cyrisma_Agent service and update it to use a service account with local admin rights for the hosts in the subnet being scanned.

  1. Merge Targets:
    • Check the boxes of the machines you want to merge as targets and select Merge.
    • Merged targets will now appear in the Target table for future vulnerability, data sensitivity, or secure baseline scans.

By following these steps, you can successfully perform a network discovery scan to identify and manage targets within your network.

identify scan locate targets network discovery how to how to

Was this article helpful?

Yes
No
Give feedback about this article

Related Articles

  • How to Scan a Linux/NAS Device Using CYRISMA Windows Agent
  • How to Deploy CYRISMA Agents via GPO
  • How to Deploy CYRISMA Agents via PowerShell
  • How To Create a Secure Baseline Scan

Partners
pax8
CDW
Stellar Cyber
RedSky Alliance

Request A Demo
Platform
  • Platform Overview
  • Resellers
  • Managed Service Providers
  • Request A Demo
  • Platform Overview
  • Resellers
  • Managed Service Providers
  • Request A Demo
Resources
  • Case Studies
  • White Papers
  • Videos
  • Blog
  • Press Release
  • Events
  • Case Studies
  • White Papers
  • Videos
  • Blog
  • Press Release
  • Events
Contact Us
Address: 510 Clinton Square, Rochester, New York, USA, 14604

Email: info@cyrisma.com

Phone: 1-585-620-2496

Easiest To Do Business With Summer 2023
Category Leader Channel Program
Capterra
Software Advice

Terms of Use          Privacy Policy

Copyright © 2024 – Data Spotlite, Inc All rights reserved.
Expand