Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • Create a Support Ticket
  • Partner Portal
  • CYRISMA MSP Dashboard
  • Home
  • General Questions and Troubleshooting

Understanding Authenticated vs. Unauthenticated Vulnerability Scans in CYRISMA

This article explains the differences between authenticated and unauthenticated scans in the CYRISMA platform, helping partners determine the best approach for assessing internal vs. external risk in their environments.

Written by Liam Downward

Updated at June 24th, 2025

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • User Manual
    Overall Risk Dashboard Agent Status Report Builder Data Scan Vulnerability Scan Secure Baseline Compliance Mitigation Dark Web MSP Interface Instance Admin
  • Self Onboarding Guide
  • Agents
  • The Cyber Risk Assessment Process
  • PSA Integrations
  • General Questions and Troubleshooting
    Agent Troubleshooting Scanning Troubleshooting
  • The Cyber Risk Assessment Process (Video Tutorials)
  • Sales and Prospecting Articles
  • CYRISMA Partner Portal Access
  • Glossary
  • API Documents
  • CYRISMA Change Log
  • Support Ticket SLA
  • Billing Questions
+ More

Table of Contents

πŸ” What Are Authenticated Scans? 🌐 What Are Unauthenticated Scans? πŸ“Š Data Collection Comparison βœ… Use Case Recommendations

πŸ” What Are Authenticated Scans?

Authenticated scans are performed using valid credentials (local, domain, or Entra) that allow deeper access into a system. When configured correctly, these scans return the most accurate, detailed picture of a device’s security posture.

Data collected includes:

Installed software, patch levels, and OS hotfixes

Running processes and services

Registry entries, scheduled tasks, and configuration settings

Local user accounts and group memberships

Antivirus/firewall/endpoint protection status

File system data, including sensitive files or misconfigurations

Accurate CVE and patch-based vulnerability detection


🌐 What Are Unauthenticated Scans?

Unauthenticated scans require no credentials and simulate what an external attacker could see. These scans are typically used for perimeter testing or external asset discovery.

Data collected includes:

Open TCP/UDP ports

Service banners and protocol versions

Operating system guesses (based on fingerprinting)

Publicly exposed web apps or network shares

SSL/TLS configuration and certificate data

Detection of default credentials and banner-grabbed CVEs


πŸ“Š Data Collection Comparison

Category Authenticated Scan Unauthenticated Scan
Software & Patch Info βœ… Full detail via registry/pkg manager ❌ Not collected
OS Version & Kernel βœ… Exact build info ⚠️ Fingerprint-based guess
Services & Processes βœ… Full list with context ❌ Not collected
Vulnerability Accuracy βœ… Deep config & patch-level CVEs ⚠️ Shallow, banner-based detection
Risk Visibility βœ… Full internal view ⚠️ External/partial view
False Positives ⚠️ Fewer ❌ More common
Credentials Required βœ… Yes ❌ No
Β 

βœ… Use Case Recommendations

Use Case Recommended Scan Type
Internal compliance validation Authenticated Scan
Patch audits or missing hotfix discovery Authenticated Scan
Secure baseline/GPO enforcement Authenticated Scan
External attack surface mapping Unauthenticated Scan
Firewall & perimeter testing Unauthenticated Scan
Public service vulnerability checks Unauthenticated Scan
Β 

Note: For the most accurate risk scoring and to fully leverage CYRISMA’s remediation planning tools, we recommend deploying authenticated scans whenever possible, especially for internal infrastructure.

vulnerability scan authenticated unauthenticated internal credentials domain

Was this article helpful?

Yes
No
Give feedback about this article

Related Articles

  • How to Create a Data Scan
  • Username Requirements for Network Scans
  • Why Agent-Based Scanning is Recommended

Partners
pax8
CDW
Stellar Cyber
RedSky Alliance

Request A Demo
Platform
  • Platform Overview
  • Resellers
  • Managed Service Providers
  • Request A Demo
  • Platform Overview
  • Resellers
  • Managed Service Providers
  • Request A Demo
Resources
  • Case Studies
  • White Papers
  • Videos
  • Blog
  • Press Release
  • Events
  • Case Studies
  • White Papers
  • Videos
  • Blog
  • Press Release
  • Events
Contact Us
Address: 510 Clinton Square, Rochester, New York, USA, 14604

Email: info@cyrisma.com

Phone: 1-585-620-2496

Easiest To Do Business With Summer 2023
Category Leader Channel Program
Capterra
Software Advice

Terms of Use          Privacy Policy

Copyright Β© 2024 – Data Spotlite, Inc All rights reserved.
Expand