LogoLogo
Log In
  • Introduction
  • Registration
  • Pre-Requirements & Initialization of the Platform
    • Agent Installations
      • Windows Installation
      • Linux Installation
      • macOS Installation
      • Deploying Agent From Microsoft Intune
    • Access and Exlusion Requirements
      • Agent-Based Demo Deployment
      • Agent-Based Production Deployment
      • Agent-Based On-Premises Deployment
      • Trendmicro Exlusions
    • Troubleshooting
  • Getting Started
    • Platform Overview
    • Agent Based Deployment
      • 1. Activating Policies
      • 2. Configure Policies in the Group
      • 3. Agent Deployment
        • Windows: Downloading and Deploying The Windows Agent
        • Linux: Downloading and Deploying The Linux Agent
        • macOS: Downloading and Deploying The macOSAgent
      • 4. Enabling Classification Rules
      • 5. Review The Results & White Listing
      • 6. Reviewing and Enabling Sigma Rules
      • 7. Generating Reports
      • 8. Notification Settings
      • 9. YARA Analysis & THOR
      • 10. Configuring YARA Rules
      • 11. Remediation Management
      • 12. Results of The Analysis
    • Using the Main Dashboard and Grids
    • Classification Rules
    • Configuring Modules
      • Threat Hunting
        • Enabling Windows Autoruns & Process Analysis
        • Enabling Weak SNMP Discovery
        • Enabling Linux Analysis
        • Job Management
        • Customizing Classification Rules
        • Enabling Windows Event Log Analysis
        • Enabling Windows Sysmon Analysis
        • Enabling Windows Thor Analysis
        • Enabling Windows Security Benchmark Analysis
        • Enabling In-Depth Analysis
      • Windows Hardening
      • Remediation & Response Management
      • Notification Management
      • Vulnerability Management
      • Network Discovery
      • Windows Patch Management
      • IP Scanning
      • Software Management
      • Managing Shadow-IT
      • Microsoft Windows Defender Health Analysis
    • Configuring Sysmon
      • Sysmon Deployment
      • Managing Sysmon Rules
      • Troubleshooting Sysmon Rules
    • Important Settings
      • Organization Settings
    • Utilizing the Platform Effectively and Interpreting the Artifact Analysis Results
    • How To Manage False Positives and Optimizing the System
    • Using AI Modules
      • AI Manuel Enrichment
      • AI Auto Enrichment
      • Automating AI Enrichment
      • AI Auto Exclusions
      • AI Feedback Questions
      • AI Auto Exclusion & Enrichment for Sysmon
      • AI Activity Logs
    • GRC Management
      • Creating an Assessment & Updating Evidences
    • Integrations
      • Office 365 Azure Registration
      • Windows Security Center Azure Registration
      • Azure Active Directory Integration
      • Active Directory Integration
      • CrowdStrike Integration
      • Palo Alto - Cortex Integration
      • Palo Alto HyperVisor Integration
      • OpenVAS Integration
      • Tenable Nessus
      • Gophish Integration
    • How to Use CyberCyte Platform Effectively?
    • Enabling External Exposure Analysis
  • Administration Guide
    • Most Used
      • Threat Overview
      • Analysis & Investigation
      • Shadow IT
      • My Assignments
      • Installation Management
      • Policy Management
      • Windows Hardening Results
      • Device Management
    • Dashboards
      • Threat Overview
      • Asset Overview
      • User Overview
      • Shadow IT
      • Analysis
    • Threat Hunting
      • Notable Events
      • Analysis & Investigation
      • Visualization
      • Hunting Settings
      • E-Mail/Teams Settings
    • Threat Response
      • Response Management
      • Incident /Case Management
      • ToDo
      • Remediation & Response Settings
      • Incident /Case Management
      • Incident/Case Management Settings
      • AI Activity
      • Interactive Sessions
    • Security Assurance
      • Hardening & Configuration Management
      • Vulnerability Management
      • Windows Remediation
      • Linux Remediation
      • Software Management
      • Windows Patch Management
      • Windows Remediation & Response Settings
      • Hardening & Configuration Management Settings
    • Asset Management
      • Endpoint Management
      • Group Management
      • Settings
    • Rules & Policies
      • Artifact Classification
      • Policy Management
      • SIGMA/YARA Rules
      • Artifact Collection Parameters
    • GRC
      • Assessment Management
      • Risk and Oppurtunity Management
      • Incident/Case Management
      • Assets
      • Document Management
      • Evidences
      • ToDo & Project Management
      • Parameters
      • Settings
      • Incident/Case Management Settings
    • Settings & Reporting
      • Agents Settings
      • Deployment Settings
      • Notification Settings
      • Integration Settings
      • AI Settings
      • Credential Settings
      • Organization Settings
      • Reporting
      • Users & Groups
    • Help
      • Ask AI
      • Configuration Wizard
      • Help Guide
      • Search
      • Version & Exception Overviews
      • Troubleshoot
    • How To Manage False Positives and Optimizing the System
  • Troubleshooting
    • Troubleshooting Multitenant Functionalities & Accessing Internal Applications
    • The Agent Troubleshooting
      • Troubleshooting the Windows Agent
      • Troubleshooting the Linux Agent
      • Troubleshooting the macOS Agent
    • Proxy Troubleshooting
      • Portal Server
      • Elastic Server
    • AI Automation Troubleshooting
      • Checking the AI Mode
      • Checking AI Audit Logs
      • Checking the AI Settings
    • Troubleshooting Synchronization Problems
  • Release Notes
    • v3.3.6
    • v3.3.5
    • v3.3.4
    • v3.3.3
    • v3.3.2
    • v3.3.1
    • v3.3
    • v3.2.1
    • v3.2
    • v3.1.4
    • v3.1.3
    • v3.1.2
    • v3.1.1
    • v3.1
    • v3.0.10
    • v3.0.8-9
    • v3.0.7
    • v3.0.6
    • v3.0.5
    • v3.0.4
    • v3.0.3
    • v3.0.2
    • v3.0.1
    • v3.0
    • v2.5.0 - v2.17.7
Powered by GitBook
On this page

Was this helpful?

  1. Getting Started
  2. Configuring Modules

IP Scanning

PreviousWindows Patch ManagementNextSoftware Management

Last updated 3 months ago

Was this helpful?

The CyberCyte can scan the internal network and display the results on the portal. For IP scanning the portal requires a Linux machine, on the machine CyberCyte agent will scan the network and return results to portal.

Please follow these steps below:

  • Please login to the CyberCyte Portal.

  • Navigate to "Rules & Policies" -> "Policy Management" and search for "Def. IP Scan & Network Testing Policy". Click on the policy name or three dots right side of the entry and click on the "Edit" button.

  • The default collection interval is 30 minutes. Users should fill these fields below:

    • Scanner Host: The scanner host must be a Linux machine with CyberCyte agent.

    • IP Block: For example 192.168.1.0/24, the field can take multiple IP blocks, users need to type the IP block and press enter for apply.

  • The other sections are designed for scenario and vulnerability tests. Other fields are optional. If users want to execute vulnerability and scenario tests on the network, the "Execute Standard Scenario Tests" and the "Execute Vulnerability Scan" options should be enabled, also the "Run Vulnerability Scan Every X" should be selected as users requirements.

Parameters
Description

Assigned Groups

The groups for policy assignments.

Collection Interval

The interval for executing the policy.

Scanner Host

The scanner host for scanning the IP block and execute scenario tests.

IP Blocks

The IP blocks for scanning.

Enable Port Scan

The option for enabling the port scan. Enabled by default.

SNMP Community Strings

The community strings for SNMP, defaults are "public", "private" and "admin".

Execute Standard Scenario Test

The option for executing the standard scenario tests.

Execute Brute Password Tests

The option for executing the brute password tests.

Execute Vulnerability Scan

The option for executing vulnerability scan.

Run Vulnerability Scan Every X

The interval for executing the vulnerability scan.

Begin Vulnerability Scan After

The time field for beginning of the vulnerability scan.

Begin Vulnerability Scan Before

The time field for before the vulnerability scan.

Credentials

The section for selecting the provided credentials.

Enable Tenable Nessus Scan

The option for enabling Tenable Nessus scan. Disabled by default.

Tenable Nessus Address

The address of the Tenable Nessus

Tenable Nessus Credential

The section for selecting the Tenable Nessus credential.

Tenable Nessus Use Existing Per Host Scan Policy

The option for enabling Tenable Nessus "Use Existing Per Host Scan Policy".

Tenable Nessus Existing Per Host Scan Policy Name

The section for selecting of the Tenable Nessus "Existing Per Host Scan Policy".

Tenable Nessus Use Existing Network Scan Policy

The option for enabling Tenable Nessus "Use Existing Network Scan Policy".

Tenable Nessus Existing Network Scan Policy Name

The section for selecting of the Tenable Nessus "Existing Network Scan Policy".

Tenable Nessus Perform Network Scan

The option for enabling Tenable Nessus "Perform Network Scan".

Tenable Nessus Network Scan Ranges

The section for selecting of the Tenable Nessus "Network Scan Ranges".

Enable Acunetix Scan

The option for enabling Acunetix scan.

Acunetix Address

The section for providing Acunetix address.

Acunetix Credential

The section for providing Acunetix credential

Acunetix Target URLs

The sction for providing Acunetix target URLs.

  • CyberCye platform can integrate with Tenable Nessus, if the credentaisl provided on the policy settings, the agent will connect to Tenable Nessus and execute vulnerability scans per host.

  • After everything is configured, please click on the "Save" button. The result can be observed under the "Asset Management" and "Security Assurance" -> "Vulnerability Management" pages.