Scan your hosts to check the compliance of your systems against your policies. You can easily add policies from our library, or create your own.
Check out this video:
A few things to consider... |
Have you thought about which hosts you want to scan and which options you want to use? We can help you sort this out quickly - review the basics for some ideas. |
Got your policies and controls ready? |
Add compliance policies that you want to report onAdd compliance policies that you want to report on A compliance policy is a collection of controls related to the technologies (operating systems and applications) and the IP addresses you want to scan. We recommend you add one or more policies now. How do I add a policy? You can import a policy from our library, or create your own. Go to Policies > New. Tip: You'll need a policy in order to create compliance reports based on your compliance scan findings. |
Technical controls are the building blocks for compliance policies. You can create user defined controls to meet your audit requirements. Learn more Tip: We test all controls in the controls library at scan time. If you want to test for user defined controls you must add them before scanning. |
Do you want to add Auditor users?Do you want to add Auditor users? You might want to add Auditor users to help with policy creation and management. Auditors have permissions to create compliance policies for the subscription, create compliance reports and manage exception requests. How do I create Auditors? Any Manager can create Auditors. Just go to Users > New > User. |
I'm ready to start my scan. What are the steps? |
It's simple to start your scan. Go to Scans > New > Scan (or Schedule Scan), and tell us: 1) which IPs to scan, 2) which scan options to use, and 3) which scanner is right for the job (if you have scanner appliances that is). |
Choosing an option profileChoosing an option profile A compliance option profile provides the settings used for a compliance scan. We recommend you use the profile "Initial PC Options" to get started. By creating your own profile, you can fine tune settings. |
I started my scan. What's next? |
Check out your scan resultsCheck out your scan results How do I know when the scan is done? You'll know when the scan status shows "Finished". At this time you can select View from the Quick Actions menu to see the full results in an HTML report. If you have notifications turned on you'll get an email. When can I run reports? We'll merge (process) your scan results into your account. Watch for the solid green circle to know the results are processed. Then you're ready to create reports based on the most recent scan findings. |
Verify that authentication workedVerify that authentication worked Information about whether hosts passed or failed authentication appears in your scan results: look at the Report Summary and the Appendix. You can also run the Authentication Report. Learn more
|
Access your scan calendar anywhere, anytime. Learn more
Check out these options: Amazon EC2 Scanning | File Integrity Monitoring | Password Auditing | Windows user Rights Controls | Detailed Security Auditing for Windows | IPv6 Scanning | Scan by Hostname | Agentless Tracking
You can exclude a host from ALL scans in one step. Add the IP to the global exclude list under Scans > Setup.