Up
Previous Next

Sheriff CSMâ„¢

Running Vulnerability Scans from Assets

You can run vulnerability scans on individual assets. The fewer assets to scan, the sooner the scan finishes.

Note: Before scanning a public network space, see Addendum Notice Regarding Scanning Leased or Public Address Space.

Important: Threat intelligence update will not finish if any vulnerability scan is running, because the update needs to refresh the vulnerability threat database used by the scan.

To run a vulnerability scan on selected assets
  1. Go to Environment > Assets & Groups > Assets.

  2. Select the asset(s) you want to edit. For assistance, see Selecting Assets in Asset List View.

  3. Click Actions, and then Run Vulnerability Scan. On Vulnerability Scan, the selected assets display at the bottom.

  4. Identify the scan job by typing a name in the Job Name field.

  5. Select a Sensor (Deputy) from the Select Sensor list.mportant: You can only run up to 5 concurrent scans per Sheriff CSM Sensor.

  6. Select a profile from the Profile list. CSM built-in vulnerability scan profiles For creating your own scan profiles, see Customizing Vulnerability Profiles.

  7. In Schedule Method, do one of the following:

    • To launch the scan without any delay, keep the default value as "Immediately".
    • To schedule the job to run at a different time, make a selection based on the table below.

      Sheriff CSM vulnerability scan schedules
      Schedule Method Description
      Immediately Launch the skin job without any delay.
      Run Once Run scan once at the specified date and time.
      Daily Run scan every x days at the specified time beginning on the specified day.
      Day of the Week Run scan on the specified date and time of the week.
      Day of the Month Run scan on the specified date and time of the month.
      Nth week of the Month Run scan on the specified day and time on the Nth week of the month. A week starts on the first day of the month and lasts 7 days.
  8. (Optional) Click Advanced.

    • For authenticated scans, choose SSH Credential (UNIX/Linux) or SMB Credential (Windows), depending on the operating system of your hosts.

      Note: Skip this step for unauthenticated scans. You need to create the credentials first. For assistance, see Creating Credentials for Vulnerability Scans.

    • Specify the maximum time (in seconds) that the scan should run. In Sheriff CSM version 5.2 and earlier, the default is 28,800 seconds (8 hours). In Sheriff CSM version 5.3 and later, the default is 57,600 seconds (16 hours).
    • To send an email notification after the scan finishes, select Yes, and then select User or Entity as the email recipient.
    • Important: Be aware of the following when making the selection:

      • Admins can view all scans.
      • If you are not an admin and you assign the scan to a different user, you can't view this scan yourself.
      • If you are an admin and you don't assign the scan to any user or entity, all non-admin users can't view this scan.
      • If you are an admin and you assign this scan to a non-admin user, both you and the non-admin user can view this scan, but other non-admin users can't.
      • If you assign the scan to an entity, all users who belong to the entity can view the scan. See Sheriff CSM User Accounts for the definition of different user roles.
  9. (Optional, available in Sheriff CSM version 5.3.2 and later) Specify the port numbers you do not want to scan in Exclude Ports. Use comma to separate the port numbers but do not use any space between them. For example, "1,33,555,26-30,44".

    Note: Using this option slows down the scan because Sheriff CSM performs additional tasks to exclude the ports you specify.

  10. (Optional) To speed up the scanning process, click Only scan hosts that are alive.

  11. (Optional) If you do not want to pre-scan from a remote Sensorre-Scan locally.

  12. (Optional) If you do not want to resolve hostnames or FQDN, click Do not resolve names.

  13. To create the vulnerability scan, click Save.

Topic revision: r28 - 24 Apr 2022, SheriffCyberSecurity
Copyright 2020 Sheriff Cyber Security, LLC. All rights reserved.