Go to Environment > Assets & Groups > Assets.
Select the asset(s) you want to edit. For assistance, see Selecting Assets in Asset List View.
Click Actions, and then Run Vulnerability Scan. On Vulnerability Scan, the selected assets display at the bottom.
Identify the scan job by typing a name in the Job Name field.
Select a Sensor (Deputy) from the Select Sensor list.mportant: You can only run up to 5 concurrent scans per Sheriff CSM Sensor.
Select a profile from the Profile list. CSM built-in vulnerability scan profiles For creating your own scan profiles, see Customizing Vulnerability Profiles.
In Schedule Method, do one of the following:
Schedule Method | Description |
Immediately | Launch the skin job without any delay. |
Run Once | Run scan once at the specified date and time. |
Daily | Run scan every x days at the specified time beginning on the specified day. |
Day of the Week | Run scan on the specified date and time of the week. |
Day of the Month | Run scan on the specified date and time of the month. |
Nth week of the Month | Run scan on the specified day and time on the Nth week of the month. A week starts on the first day of the month and lasts 7 days. |
(Optional) Click Advanced.
Note: Skip this step for unauthenticated scans. You need to create the credentials first. For assistance, see Creating Credentials for Vulnerability Scans.
Important: Be aware of the following when making the selection:
(Optional, available in Sheriff CSM version 5.3.2 and later) Specify the port numbers you do not want to scan in Exclude Ports. Use comma to separate the port numbers but do not use any space between them. For example, "1,33,555,26-30,44".
Note: Using this option slows down the scan because Sheriff CSM performs additional tasks to exclude the ports you specify.
(Optional) To speed up the scanning process, click Only scan hosts that are alive.
(Optional) If you do not want to pre-scan from a remote Sensorre-Scan locally.
(Optional) If you do not want to resolve hostnames or FQDN, click Do not resolve names.
To create the vulnerability scan, click Save.