How To Create an Internal Authenticated Vulnerability Scan
Learn how to conduct internal authenticated vulnerability scans to improve the security of your organization's network infrastructure.
- User Manual
- Agents
- The Cyber Risk Assessment Process
- API Documents
- General Questions and Troubleshooting
- The Cyber Risk Assessment Process (Video Tutorials)
- Sales and Prospecting Articles
- CYRISMA Partner Portal Access
- Glossary
- CYRISMA Change Log
- Support Ticket SLA
- Onboarding Framework
- PSA Integrations
- Billing Questions
- Self Onboarding Guide
-
Navigate to Schedule a Scan:
- Go to Vulnerability Scan > Schedule a Scan in your dashboard.
-
Name the Scan:
- Enter a descriptive name for your scan, such as "VS_INT_Auth_1".
-
Select Scan Type:
- From the dropdown menu, choose "Internal - Authenticated".
-
Choose Agent or Agent Group:
- Select the desired agent for the scan. Alternatively, you can choose an agent_group to group your agents, allowing them to scan themselves for quick and efficient results. Note that this option is only available for agent-based scanning.

-
Select Targets:
- Choose the specific target(s) that you want to scan.
-
Specify Credentials:
- For the Credential To Be Used, you can either select the agent's designated credentials or opt for alternative credentials.
Schedule the Scan:
- Choose when you would like the scan to run. You can also select the option to Notify When Complete and attach a report.
-
Submit the Scan:
- Once all settings are configured, click Submit to finalize and schedule the scan.

By following these steps, you can successfully set up an internal authenticated vulnerability scan tailored to your scanning needs.