Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • Create a Support Ticket
  • Partner Portal
  • CYRISMA MSP Dashboard
  • Home
  • General Questions and Troubleshooting

Understanding CYRISMA's Internal and External Vulnerability Scans

CYRISMA provides a range of powerful vulnerability scanning options to help you identify risks in both internal and external environments. Understanding how these scans work and when to apply specific configurations, like IP whitelisting, can maximize their effectiveness.

Written by Liam Downward

Updated at January 22nd, 2025

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • User Manual
    Overall Risk Dashboard Agent Status Report Builder Data Scan Vulnerability Scan Secure Baseline Compliance Mitigation Dark Web MSP Interface Instance Admin
  • Self Onboarding Guide
  • Agents
  • The Cyber Risk Assessment Process
  • PSA Integrations
  • General Questions and Troubleshooting
    Agent Troubleshooting Scanning Troubleshooting
  • The Cyber Risk Assessment Process (Video Tutorials)
  • Sales and Prospecting Articles
  • CYRISMA Partner Portal Access
  • Glossary
  • API Documents
  • CYRISMA Change Log
  • Support Ticket SLA
  • Billing Questions
+ More

Table of Contents

Internal Vulnerability Scans Authenticated vs. Unauthenticated Scans Steps for Running Internal Scans External Vulnerability Scans Types of External Scans Key Practice: Testing Before and After Whitelisting Best Practices for Vulnerability Scanning with CYRISMA Why This Matters

Internal Vulnerability Scans

Authenticated vs. Unauthenticated Scans

Authenticated Scans:
These scans use credentials to log into devices and identify vulnerabilities that require higher-level access to detect. This scan type provides more in-depth results, including configuration issues and vulnerabilities that are not exposed externally.

Unauthenticated Scans:
These scans do not require credentials and provide a general view of open ports and visible vulnerabilities. They are useful for IoT devices, printers, and other endpoints where authentication is not feasible.

Steps for Running Internal Scans

  • Deploy an agent to act as a probing device or install agents across all endpoints for group scanning.
  • Use the Network Discovery tool to identify all devices on the subnet, including operating systems, printers, and IoT devices.
  • Merge the discovered devices as targets to run authenticated or unauthenticated scans.

External Vulnerability Scans

Types of External Scans

IP Address Scan:
This scans the external-facing IP addresses of an organization to identify exposed ports, services, and vulnerabilities.

Web Application Scan:
This focuses on the security posture of external web applications, detecting vulnerabilities like cross-site scripting (XSS) and SQL injection.

Key Practice: Testing Before and After Whitelisting

Jim suggests a valuable approach when running external scans:

Run the External IP Scan Without Whitelisting:
Conduct an initial scan without whitelisting CYRISMA's IP addresses to observe how the client's firewall behaves. If their firewall effectively blocks the scan, it confirms that their security measures are doing their job.

Request IP Whitelisting and Re-run the Scan:
Provide the client with CYRISMA's IP addresses for whitelisting. After they whitelist the IPs, re-run the scan to obtain detailed results, including vulnerabilities that may otherwise remain hidden behind the firewall.


Best Practices for Vulnerability Scanning with CYRISMA

Start with a Probe:
Use unauthenticated scans to get a high-level view of the environment. For deeper insights, follow up with authenticated scans.

Iterate Scans:
Run scans periodically to detect newly introduced vulnerabilities or configuration changes.

Use Whitelisting Strategically:
Employ the "before and after whitelisting" method to validate the client's security configurations and extract actionable insights.

Leverage Reports:
CYRISMA generates comprehensive reports, including high-risk vulnerabilities, open ports, and security gaps. Use these for client presentations or internal action plans.


Why This Matters

By understanding and effectively using CYRISMA's internal and external vulnerability scans, organizations can:

  • Identify and address weaknesses in their cybersecurity posture.
  • Validate the efficacy of their firewall and network configurations.
  • Provide actionable insights to improve overall security.

This dual approach ensures clients receive maximum value while demonstrating CYRISMA’s capabilities as a trusted security partner.

risk assessment understanding internal scan external scan ip address web app web application cybersecurity scan

Was this article helpful?

Yes
No
Give feedback about this article

Related Articles

  • Cloud Scan Troubleshooting
  • Why is my Web App Scanning Failing?
  • Why is My Cloud Scan Not Starting as Scheduled?

Partners
pax8
CDW
Stellar Cyber
RedSky Alliance

Request A Demo
Platform
  • Platform Overview
  • Resellers
  • Managed Service Providers
  • Request A Demo
  • Platform Overview
  • Resellers
  • Managed Service Providers
  • Request A Demo
Resources
  • Case Studies
  • White Papers
  • Videos
  • Blog
  • Press Release
  • Events
  • Case Studies
  • White Papers
  • Videos
  • Blog
  • Press Release
  • Events
Contact Us
Address: 510 Clinton Square, Rochester, New York, USA, 14604

Email: info@cyrisma.com

Phone: 1-585-620-2496

Easiest To Do Business With Summer 2023
Category Leader Channel Program
Capterra
Software Advice

Terms of Use          Privacy Policy

Copyright © 2024 – Data Spotlite, Inc All rights reserved.
Expand