Views:

Conduct agentless scanning of your network for fast visibility into your organization's network infrastructure and vulnerabilities.

Important
Important
To view Network Vulnerability Scanner and see scans and reports, your user account must have the following permissions:
  • View for Vulnerability Management
  • View for Service Gateway Management
  • View for user accounts in Administration
Data for network devices discovered by Network Vulnerability Scanner is only available for users with the Unmanaged devices asset visibility scope. Data for internet-facing assets is only available for users with the Internet-facing assets asset visibility scope. For more information, see Asset Visibility Management.
Network Vulnerability Scanner allows you to systematically discover network assets, identify potential security weaknesses in network devices, and detect misconfigurations in your internet-facing assets to safeguard against cyber threats and ensure the integrity of your organization’s infrastructure. No agent deployment is required. You can create individual scan configurations based on templates and set the scans to run on a predetermined schedule or trigger scans manually.
Network Vulnerability Scanner requires an up-to-date Service Gateway virtual appliance with version 1.1.0 or later of the Network Vulnerability Scanner service installed. When configuring a new scan in Scan Templates or by clicking Create scan in Network scans, you may choose the Service Gateway to use for the specified scan. Only Service Gateways with the Network Vulnerability Scanner service installed are able to run scans. A single Service Gateway can run up to a maximum of 15 concurrent scans.
Tip
Tip
To request more templates, click Need more templates? in Scan templates and provide your feedback.
For scan templates that require authentication credentials, you can configure and securely store the authentication information for reuse in the Credential Vault.
After a scan completes, you can download the scan report from the Scan Reports tab to view discovered devices and detected vulnerabilities or misconfigurations. Discovered devices appear in Attack Surface Discovery. Detected vulnerabilities and system configuration events appear in Threat and Exposure Management and Cyber Risk Overview.
Important
Important
For all scan templates, Network Vulnerability Scanner only uses a single IP address to scan and report results for any supplied FQDN that resolves to multiple IP addresses.