Understanding CYRISMA's Default Scanning Feature
The Default Vulnerability Scan in the CYRISMA platform is designed to simplify deployment, automate vulnerability management, and enhance compliance readiness. With automated agent assignments and system-enforced scanning, organizations can ensure a standardized security baseline across their environments effortlessly.
- User Manual
- Agents
- The Cyber Risk Assessment Process
- API Documents
- General Questions and Troubleshooting
- The Cyber Risk Assessment Process (Video Tutorials)
- Sales and Prospecting Articles
- CYRISMA Partner Portal Access
- Glossary
- CYRISMA Change Log
- Support Ticket SLA
- Onboarding Framework
- PSA Integrations
- Billing Questions
- Self Onboarding Guide
Table of Contents
Key Features & Benefits
1. Seamless Deployment at Scale
Utilize the Auto-Provision function to deploy hundreds to thousands of machines effortlessly.
The setup script automatically assigns these machines to the Default Vulnerability Scan, ensuring full coverage without manual intervention.
2. Automated Assignments
Once CYRISMA agents are installed, they are automatically added to the default scan.
Eliminates manual configuration, streamlining the vulnerability management process.
3. System-Level Scan (Non-Deletable)
The Default Vulnerability Scan cannot be deleted as it is an essential part of the system.
Guarantees a standardized security assessment across all managed devices.
4. Flexible Scheduling for Compliance
The scan is pre-configured to run weekly but can be modified to run daily continuous scanning.
Enables organizations to meet compliance mandates effortlessly.
5. Full Authenticated Vulnerability Scanning in Minutes
Provides complete coverage across an environment with minimal setup time.
Reduces the complexity of configuring scans, ensuring faster security assessments.
Why This Matters
Automated & Hands-Free – Reduces the need for manual intervention in security assessments.
Ensures Compliance – Pre-configured settings align with industry best practices and regulatory requirements.
Faster Time-to-Security – Get fully authenticated vulnerability scanning up and running in minutes instead of hours.
The Default Vulnerability Scan is built to make security management faster, more scalable, and compliance-ready. If you have any questions or need further assistance, our support team is here to help!