Traditional Active Scans (Credentialed)

A traditional active credentialed scan, also known as an authenticated scan, provides a deeper insight than a non-credentialed scan. The scan uses credentials to log into systems and applications and can provide a definitive list of required patches and misconfigurations.

Because a credentialed scan looks directly at the installed software, including at the version numbers, it can assess items such as:

  • Identifying vulnerabilities in the software.
  • Evaluating password policies.
  • Enumerating USB devices.
  • Checking anti-virus software configurations.

It performs all these tasks with minimal to no impact on the device.

Benefits

  • Consumes far fewer resources than non-credentialed scanning because the scan executes on hosts themselves rather than across the network.
  • Non-disruptive; that is, does not have a negative effect on the network, device, or application you are testing.
  • Provides more accurate results—a complete enumeration of software and patches installed on the host.
  • Uncovers client-side software vulnerabilities.

Limitations

  • Requires credentials management for each scanned host.
    • Large organizations can potentially struggle with creating service accounts with the proper rights and access needed to safely conduct a credentialed scan.
    • Password rotation requirements can add to management complexity.

    Note: Tenable integrates with leading password vaults and password managers to alleviate this limitation for traditional active credentialed scanning.

  • Misses transient devices that are not always connected to the network.