Scanners
Scanner Profiles
A scanner profile determines whether scans are for an internal or external network, establishes blackout times when scans are not allowed, and provides rules for IP address and port ranges.
This section describes how to view and modify a scanner profile, which establishes the network boundaries for scanning your environment.
To view and modify scanner profiles
- From the , select Scan Settings > Scanner Profiles.
-
Select the scanner profile to modify.
- On the General Settings tab, change the Scanner profile name.
- Select Save profile.
- On the IPs & Ports tab, create rules for the scanner profile by doing the following:
- Select whether to Include or Exclude IP addresses and ports.
- Enter the IP addresses you want to include and exclude (use commas to separate addresses or enter a range).
Example IP range: 192.168.2.1-192.168.2.255
NOTE: If you have infrastructure in a hosted environment, you can add the IP addresses based on where your assets reside. For example, Amazon Web Services (AWS) provides CIDR notation of its IP ranges, which you could include in your scanner profile.
- Select Save profile. Your scanner profile rule is created and appears at the bottom of the screen.
- On the Blackout Times tab, select when you do not want scans to run and then select Save blackout times.
Scanner Status
This section describes how to view and modify scanner settings.
To view and modify a scanner’s settings
-
From the
, select Scan Settings > Scanner Profiles. -
Select the name of the scanner to view. You are on the scanner’s page, which includes information about the scanner’s Settings, Node, Installed Software, DNS Settings, and Disk Partitions.
-
Modify at least one of the scanner’s settings:
-
Scanner name
-
Time zone
-
Scanner profile
-
-
Select Save.
RNA User Access
During a support session or Penetration Test, organizations may choose to grant temporary access to internal RNA's for testing purposes. As a user you can see what party or parties currently have access to your RNA. From the
select Scan Settings > Scanners.Displayed is a list of the scanners available to your account. Select the name of the scanner which you wish to inspect. Scroll through the information headers and details pertaining to the scanner until you reach RNA User Access. There are listed details of each user who has access to your RNA including their user name, email address, selected account, and duration of access.
RNA Scanner Appliance Installation
The Reconnaissance Network Appliance (RNA) is a virtual appliance installed on your network for the purpose of running vulnerability scans against your assets. The comprehensive data gathered by the RNA is presented to you on Fortra Vulnerability Management (Fortra VM), a web portal that helps you understand and manage your vulnerabilities.
This appliance is a virtual device running on a host computer in a virtual environment.
See related: Install RNA Virtual Scanner Appliance