Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • Create a Support Ticket
  • Partner Portal
  • CYRISMA MSP Dashboard
  • Home
  • General Questions and Troubleshooting
  • Scanning Troubleshooting

Scanning Issues in Secure Baseline

This article addresses issues raised by users regarding secure baseline scans in CYRISMA: Suppression functionality not working as expected. Clarification on scanning representative machines based on Group Policy. These insights aim to provide users with guidance on effective usage of the secure baseline feature and avoid common pitfalls.

Written by Liam Downward

Updated at December 4th, 2024

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • User Manual
    Overall Risk Dashboard Agent Status Report Builder Data Scan Vulnerability Scan Secure Baseline Compliance Mitigation Dark Web MSP Interface Instance Admin
  • Self Onboarding Guide
  • Agents
  • The Cyber Risk Assessment Process
  • PSA Integrations
  • General Questions and Troubleshooting
    Agent Troubleshooting Scanning Troubleshooting
  • The Cyber Risk Assessment Process (Video Tutorials)
  • Sales and Prospecting Articles
  • CYRISMA Partner Portal Access
  • Glossary
  • API Documents
  • CYRISMA Change Log
  • Support Ticket SLA
  • Billing Questions
+ More

Table of Contents

Issue: Clarification on Scanning Representative Machines Problem Why This Matters Best Practice How to Implement Next Steps for Users Additional Notes Conclusion

Issue: Clarification on Scanning Representative Machines

Problem

Users are scanning all devices in their environment without realizing they only need to scan representative machines based on Group Policy.

Why This Matters

Scanning all machines in environments with consistent Group Policy settings results in unnecessary scans and redundant data.

Best Practice

  • Scan a Representative Machine: Select one machine from each Group Policy to represent its settings.
  • Avoid Scanning All Machines: If 100 devices share the same Group Policy, scanning all 100 devices is redundant.

How to Implement

  1. Identify the number of unique Group Policies in your environment.
  2. Select one machine from each Group Policy as a representative.
  3. Run secure baseline scans only on the selected representative machines.

Next Steps for Users

  • Implement the representative machine scanning approach.
  • Look for updates in CYRISMA documentation for clear instructions.

Additional Notes

  • Group Policy Trends: While remote work has reduced the prevalence of Group Policy enforcement in some environments, it remains a key consideration for many organizations.

Conclusion

CYRISMA is committed to addressing these issues to improve user experience. For further questions or to report additional concerns, please reach out to our support team.

suppress suppression scanning scanning issue secure baseline scan secure baseline issue

Was this article helpful?

Yes
No
Give feedback about this article

Related Articles

  • How to Change the Secure Baseline Profile for Targets
  • Secure Baseline Scan History

Partners
pax8
CDW
Stellar Cyber
RedSky Alliance

Request A Demo
Platform
  • Platform Overview
  • Resellers
  • Managed Service Providers
  • Request A Demo
  • Platform Overview
  • Resellers
  • Managed Service Providers
  • Request A Demo
Resources
  • Case Studies
  • White Papers
  • Videos
  • Blog
  • Press Release
  • Events
  • Case Studies
  • White Papers
  • Videos
  • Blog
  • Press Release
  • Events
Contact Us
Address: 510 Clinton Square, Rochester, New York, USA, 14604

Email: info@cyrisma.com

Phone: 1-585-620-2496

Easiest To Do Business With Summer 2023
Category Leader Channel Program
Capterra
Software Advice

Terms of Use          Privacy Policy

Copyright © 2024 – Data Spotlite, Inc All rights reserved.
Expand