Role Availability | Read-Only | Investigator | Analyst | Manager |
Warning: An authenticated scan may fail if the local mail exchanger, which applies to Linux hosts, is enabled in the target asset.You cannot scan USM Anywhere Sensors.
- The sensor reaches the targets
- The sensor is able to scan their ports
Operating System | Method and Credentials | Escalation |
---|---|---|
Linux, BSD, Solaris, or macOS | SSH password or public key authentication | sudo or su |
Microsoft Windows | Windows username and password through WinRM | None |
Note: If a scan is suspended or otherwise running for more than two hours, it will time out. You can see the timeout result in the asset’s Scan History, as well as in the system event generated for that scan.
- Go to Environment > Assets.
-
Complete one of these options:
- Next to the asset name that you want to scan, click the
icon select Full Details, and then select Actions > Authenticated Scan.
- Next to the asset name you want to scan, click the
icon and select Authenticated Scan to directly start the asset scan. If the option is not enabled, you need to add a credential. See Managing Credentials in USM Anywhere for more information.
Important: Credentials assigned directly to an asset have higher priority than those assigned to an asset group. - Next to the asset name that you want to scan, click the
-
In the asset details page, click Scan History in the table area to display the results of the scan.
You can see the status of each scan and its details, which informs you if the scan is unsuccessful due to bad credentials or a connectivity issue between the USM Anywhere Sensor and the asset you are attempting to scan. USM Anywhere also creates a system event named Authenticated Asset Scanner Result for the scan and for testing the credentials.
Each asset has a Scan Details link you can click to download a zip file containing the details of the recent scan. The link is only present for the most recent scan of each asset, and is available for one week after the scan has been run.
Below the Vulnerabilities tab, you can see the vulnerabilities that the scan has found.
You can also see the vulnerabilities that the scan has found by going to Environment > Vulnerabilities. While the scan is running, a Scanning button displays. When the scan finishes, the message Scan finished. Refresh to view scan results displays. Click Refresh Scan Results to update the list.
Note: See Scheduling Authenticated Asset Scans from Assets and Scheduling Asset Scans from the Job Scheduler Page for more information about how to schedule an authenticated asset scan.