Start Scanning for Policy Compliance

Scan your hosts to check the compliance of your systems against your policies. You can easily add policies from our library, or create your own.

 

Have you thought about which hosts you want to scan and which options you want to use? We can help you sort this out quickly - review the basics for some ideas.

Scanning - The Basics

 

A compliance policy is a collection of controls related to  the technologies (operating systems and applications) and the IP addresses you want to scan. We recommend you add one or more policies now.

How do I add a policy? You can import a policy from our library, or create your own. Go to Policies > New.

Tip: You'll need a policy in order to create compliance reports based on your compliance scan findings.

Technical controls are the building blocks for compliance policies. You can create user defined controls to meet your audit requirements. Learn more

Tip: We test all controls in the controls library at scan time. If you want to test for user defined controls you must add them before scanning.

You might want to add Auditor users to help with policy creation and management. Auditors have permissions to create compliance policies for the subscription, create compliance reports and manage exception requests.

How do I create Auditors? Any Manager can create Auditors. Just go to Users > New > User.

 

It's simple to start your scan. Go to Scans > New > Scan (or Schedule Scan), and tell us:

1) which IPs to scan,

2) which scan options to use, and

3) which scanner is right for the job (if you have scanner appliances that is).

A compliance option profile provides the settings used for a compliance scan. We recommend you use the profile "Initial PC Options" to get started. By creating your own profile, you can fine tune settings.

 

How do I know when the scan is done? You'll know when the scan status shows "Finished". At this time you can select View from the Quick Actions menu to see the full results in an HTML report. If you have notifications turned on you'll get an email.

When can I run reports? We'll merge (process) your scan results into your account. Watch for the solid green circle Scan Finished, Results Processed Icon to know the results are processed. Then you're ready to create reports based on the most recent scan findings.

Learn more about scan results

Information about whether hosts passed or failed authentication appears in your scan results: look at the Report Summary and the Appendix. You can also run the Authentication Report. Learn more

 

Stay in sync with your scan calendar

Access your scan calendar anywhere, anytime. Learn more

Interested in more scanning capabilities?

Check out these options: Amazon EC2 Scanning | File Integrity Monitoring | Password Auditing | Windows user Rights Controls | Detailed Security Auditing for Windows | IPv6 Scanning | Scan by Hostname | Agentless Tracking

Quick Links

Manage your scans

Set up host authentication

Configure scan settings

Configure appliances

Resources

Best Practices for Scanning

Did you know? You can exclude a host from ALL scans in one step. Add the IP to the global exclude list under Scans > Setup.