How To Create an Internal Unauthenticated Vulnerability Scan
Learn how to conduct internal unauthenticated vulnerability scans to identify potential security weaknesses within your organization's network.
- User Manual
- Agents
- The Cyber Risk Assessment Process
- API Documents
- General Questions and Troubleshooting
- The Cyber Risk Assessment Process (Video Tutorials)
- Sales and Prospecting Articles
- CYRISMA Partner Portal Access
- Glossary
- CYRISMA Change Log
- Support Ticket SLA
- Onboarding Framework
- PSA Integrations
- Billing Questions
- Self Onboarding Guide
-
Navigate to Schedule a Scan:
- Go to Vulnerability Scan > Schedule a Scan > Create.
-
Name the Scan:
- Enter a descriptive name for your scan, such as "VS_INT_UnAuth_1".
-
Select Scan Type:
- Choose the "Internal - Unauthenticated" option.
-
Choose Agent:
- Select the desired agent for the scan. Typically, it is recommended to run this from a server.

-
Enter Internal IP:
- Input the internal IP address in the designated field, using the appropriate subnet (e.g.,
/24
). To find your private IP, open a command prompt and typeipconfig
.
- Input the internal IP address in the designated field, using the appropriate subnet (e.g.,
-
Schedule the Scan:
- Choose when you would like the scan to run and select the option to Notify When Complete.
-
Submit the Scan:
- Once all settings are configured, click Submit to finalize and schedule the scan.

By following these steps, you can efficiently set up an internal unauthenticated vulnerability scan to assess your network's security posture.