![Page 1: The Information Security Experts Copyright © 2008 SecureWorks, Inc. All rights reserved. SecureWorks Scanning Module](https://reader035.vdocuments.mx/reader035/viewer/2022070400/56649f115503460f94c2440d/html5/thumbnails/1.jpg)
The Information Security ExpertsCopyright © 2008 SecureWorks, Inc. All rights reserved.
SecureWorks Scanning Module
![Page 2: The Information Security Experts Copyright © 2008 SecureWorks, Inc. All rights reserved. SecureWorks Scanning Module](https://reader035.vdocuments.mx/reader035/viewer/2022070400/56649f115503460f94c2440d/html5/thumbnails/2.jpg)
The Information Security ExpertsCopyright © 2008 SecureWorks, Inc. All rights reserved.
• Perform internal and external network scans also asset discovery
• Quickly identify whether your scanning exposure increased or decreased over a period of time
• Expedite remediation utilizing the provided exposure synopsis and solutions
![Page 3: The Information Security Experts Copyright © 2008 SecureWorks, Inc. All rights reserved. SecureWorks Scanning Module](https://reader035.vdocuments.mx/reader035/viewer/2022070400/56649f115503460f94c2440d/html5/thumbnails/3.jpg)
The Information Security ExpertsCopyright © 2008 SecureWorks, Inc. All rights reserved.
Vulnerability Scanning Summary
![Page 4: The Information Security Experts Copyright © 2008 SecureWorks, Inc. All rights reserved. SecureWorks Scanning Module](https://reader035.vdocuments.mx/reader035/viewer/2022070400/56649f115503460f94c2440d/html5/thumbnails/4.jpg)
The Information Security ExpertsCopyright © 2008 SecureWorks, Inc. All rights reserved.
Remediation
![Page 5: The Information Security Experts Copyright © 2008 SecureWorks, Inc. All rights reserved. SecureWorks Scanning Module](https://reader035.vdocuments.mx/reader035/viewer/2022070400/56649f115503460f94c2440d/html5/thumbnails/5.jpg)
The Information Security ExpertsCopyright © 2008 SecureWorks, Inc. All rights reserved.
![Page 6: The Information Security Experts Copyright © 2008 SecureWorks, Inc. All rights reserved. SecureWorks Scanning Module](https://reader035.vdocuments.mx/reader035/viewer/2022070400/56649f115503460f94c2440d/html5/thumbnails/6.jpg)
The Information Security ExpertsCopyright © 2008 SecureWorks, Inc. All rights reserved.
Synopsis, Description and Solutions
![Page 7: The Information Security Experts Copyright © 2008 SecureWorks, Inc. All rights reserved. SecureWorks Scanning Module](https://reader035.vdocuments.mx/reader035/viewer/2022070400/56649f115503460f94c2440d/html5/thumbnails/7.jpg)
The Information Security ExpertsCopyright © 2008 SecureWorks, Inc. All rights reserved.
Vulnerability Scanning Scheduler
![Page 8: The Information Security Experts Copyright © 2008 SecureWorks, Inc. All rights reserved. SecureWorks Scanning Module](https://reader035.vdocuments.mx/reader035/viewer/2022070400/56649f115503460f94c2440d/html5/thumbnails/8.jpg)
The Information Security ExpertsCopyright © 2008 SecureWorks, Inc. All rights reserved.
Types of Scans
a) Default: similar to the Commonports_ping which scans approximately 4,500 ports that are frequently listening (such as ports 22, 80, 443, 445, etc.). Before attempting to scan a given host a ping must be returned.
b) Discovery: profile will not perform a port scans only ping the specified networks/hosts and provide a report containing hosts that responded to the ping.
c) Commonports_noping :similar to the default scan the only difference is that All target IPs will be port scanned and they do not have to return a ping. This implies a longer time to completion, as every IP will be port scanned for ~4,500 ports
d) Allports_ping: this scan is ran against all ~65,000 ports on every target IP. Before attempting to scan a given host a ping must be returned.
e) Allports_noping : this scan is leverage all ~65,000 ports on every target IP. All target IPs will be portscanned; they do not have to return a ping. This implies a significantly longer time to completion, as every IP will be portscanned for ~65,000 ports. A scan of a /24 network can be expected to take close to 24 hours.
f) Allports_noping-Exceedingly_Verbose : scans all ~65,000 ports on every target IP. All target IPs will be portscanned; they do not have to return a ping. This implies a significantly longer time to completion, as every IP will be portscanned for ~65,000 ports. A scan of a /24 network can be expected to take close to 24 hours. This profile is designed specifically to return multiple low-risk exposures for every host scanned.
g) OS_Detection : Scans a few ports in an effort to fingerprint the OS. Before attempting to scan a given host a ping must be returned.
![Page 9: The Information Security Experts Copyright © 2008 SecureWorks, Inc. All rights reserved. SecureWorks Scanning Module](https://reader035.vdocuments.mx/reader035/viewer/2022070400/56649f115503460f94c2440d/html5/thumbnails/9.jpg)
The Information Security ExpertsCopyright © 2008 SecureWorks, Inc. All rights reserved.
Pending/Completed Scans
![Page 10: The Information Security Experts Copyright © 2008 SecureWorks, Inc. All rights reserved. SecureWorks Scanning Module](https://reader035.vdocuments.mx/reader035/viewer/2022070400/56649f115503460f94c2440d/html5/thumbnails/10.jpg)
The Information Security ExpertsCopyright © 2008 SecureWorks, Inc. All rights reserved.
Active Scan Progress
![Page 11: The Information Security Experts Copyright © 2008 SecureWorks, Inc. All rights reserved. SecureWorks Scanning Module](https://reader035.vdocuments.mx/reader035/viewer/2022070400/56649f115503460f94c2440d/html5/thumbnails/11.jpg)
The Information Security ExpertsCopyright © 2008 SecureWorks, Inc. All rights reserved.
Conclusion
Secure Operations Center 877-838-7960 [email protected]