Scanners

Scanner Profiles

A scanner profile determines whether scans are for an internal or external network, establishes blackout times when scans are not allowed, and provides rules for IP address and port ranges.

This section describes how to view and modify a scanner profile, which establishes the network boundaries for scanning your environment.

NOTE: A scanner can have only one profile applied to it at a time.

To view and modify scanner profiles

  1. From the navigation menu, select Scan Settings > Scanner Profiles.
  2. Select the scanner profile to modify.

  3. On the General Settings tab, change the Scanner profile name.
  4. Select Save profile.
  5. On the IPs & Ports tab, create rules for the scanner profile by doing the following:
    1. Select whether to Include or Exclude IP addresses and ports.
    2. Enter the IP addresses you want to include and exclude (use commas to separate addresses or enter a range).

      Example IP range: 192.168.2.1-192.168.2.255

      NOTE: If you have infrastructure in a hosted environment, you can add the IP addresses based on where your assets reside. For example, Amazon Web Services (AWS) provides CIDR notation of its IP ranges, which you could include in your scanner profile.
  6. Select Save profile. Your scanner profile rule is created and appears at the bottom of the screen.
  7. NOTE: If you want your scanner profile to have a combination of included and excluded rules, you have to create separate rules for each type.
  8. On the Blackout Times tab, select when you do not want scans to run and then select Save blackout times.
NOTE: Times highlighted blue are just a guide for typical business hours. A running scan pauses if it conflicts with a blackout period; it resumes once the blackout period ends.

Scanner Status

This section describes how to view and modify scanner settings.

To view and modify a scanner’s settings

  1. From the navigation menu, select Scan Settings > Scanner Profiles.

  2. Select the name of the scanner to view. You are on the scanner’s page, which includes information about the scanner’s Settings, Node, Installed Software, DNS Settings, and Disk Partitions.

  3. Modify at least one of the scanner’s settings:

    1. Scanner name

    2. Time zone

    3. Scanner profile

  4. Select Save.

RNA User Access

During a support session or Penetration Test, organizations may choose to grant temporary access to internal RNA's for testing purposes. As a user you can see what party or parties currently have access to your RNA. From the navigation menu select Scan Settings > Scanners.

Displayed is a list of the scanners available to your account. Select the name of the scanner which you wish to inspect. Scroll through the information headers and details pertaining to the scanner until you reach RNA User Access. There are listed details of each user who has access to your RNA including their user name, email address, selected account, and duration of access.

RNA Scanner Appliance Installation

The Reconnaissance Network Appliance (RNA) is a virtual appliance installed on your network for the purpose of running vulnerability scans against your assets. The comprehensive data gathered by the RNA is presented to you on Fortra Vulnerability Management (Fortra VM), a web portal that helps you understand and manage your vulnerabilities.

This appliance is a virtual device running on a host computer in a virtual environment.

See related: Install RNA Virtual Scanner Appliance