Get Started with Alert Logic Scans

A scan detects and identifies network and host vulnerabilities in your environment. Scans can perform external attack simulations as well as comprehensive vulnerability checks including registry evaluation. For more information, see the detailed About Alert Logic Scans documentation. Alert Logic scans can also help you meet Payment Card Industry (PCI) compliance requirements. For more information, see Manage PCI Scans.

You can check the operational status of your automated and scheduled scans in the Service Status page in the Alert Logic console. Alert Logic recommends that you subscribe to the Service Status page and all your Alert Logic components, including scans. For more information about the Service Status page and how to subscribe, see Service Status.

Scan types

There are four types of supported scans:

  • Discovery scans
  • Internal scans
  • External scans
  • PCI scans

Discovery scans

A discovery scan is used to identify hosts on a network. The scanner makes a reasonable attempt to identify live systems, including systems that do not respond to common Internet Control Message Protocol (ICMP) echo requests.

Internal scans

An internal scan runs from an Alert Logic appliance in your environment. You can specify credentials to use with the internal scan in topology. If you provide credentials, Alert Logic can log on to your network and collect information while it performs comprehensive vulnerability checks including registry setting evaluation. If you do not provide credentials, Alert Logic scans your network without logging on and performs as many checks as possible.

External scans

An external scan runs from the Alert Logic network against your environment. This type of scan simulates attacks from outside your network and identifies potential issues from these attack types.

PCI scans

A PCI scan is a type of external scan that is used specifically for Payment Card Industry (PCI) compliance requirements. For more information on PCI scans, see Manage PCI Scans.

Scanning best practices summary

When configuring your scans, use the following guidelines to create successful scans and scan results. For more in-depth best practices, see the detailed Scanning best practices.

  • Scan often
  • Scan everything in your network
  • Scan at the right times
    • Scan your servers, firewalls, and routers during off-peak times
    • Scan your workstations during working hours
    • Scan your staging devices and remediate any issues findings before scanning production devices
  • Do not scan during service windows

Optimize your scans

When configuring your assets for scanning, consider and implement a strategy that is particular to your scanning targets and environment.

  • Use credentialed scans on everything, and use un-credentialed scans as fallback. Credentialed scans produce the most accurate results and should be used on all servers and workstations. Un-credentialed scans should be used only for devices where credentialed scanning is not available, for example, routers, switches, and printers.
  • Be mindful of what you are scanning. In terms of length, not all types of scans are equal. Windows-credentialed scanning takes longer than all other credentialed or non-credentialed scans. Under test scenarios, Windows-credentialed scans have taken up to four times as long as other scans. The web application scanning component used in Alert Logic PCI scans can also run long due to the amount of web pages present and the number of fields on each page, multiplied by the number of sites being scanned. Consider these factors when defining your scans and determining scan windows.
  • Multitask. Scan your networks separately in a staggered schedule to allow for remediation in stages.
  • Try not to scan over WAN links or VPN. The traffic between the scanner and the scan target is high compared to the relatively low traffic between the scanner and Alert Logic. Place the scanner on the same side of the VPN or WAN link as the scan target for the best use of your bandwidth.

Statistics

The Alert Logic console contains several pages where you can access data pulled from scan results:

You are also notified when assets have not been scanned in the Remediations page. See Configuration Remediations for more information.

Scan results

You can review scan results and their outcomes in several different pages in the Alert Logic console:

Search vulnerabilities

You have access to view vulnerabilities. The Vulnerability Analysis reports allow you to view and filter vulnerabilities in the your environment. The List of Vulnerabilities in the Monthly Vulnerability Summary displays all vulnerabilities in the filters you choose.

Scanned assets and credentials

You can filter your assets by regions, networks, subnets, hosts, tags and other assets to see what is being scanned from the Topology page. You can also manage your credentials to set up credentialed scanning for assets on this page. See Topology for more information.