- Unrestricted access to all targets in the scan for all TCP ports. No firewalls of IDS/IPS solutions should be blocking the scanner.
- Verifying the targets will allow a scanner to assess for vulnerabilities and will not reject the scan with native OS tools like a firewall, SYN Flood Protection, or from a local EPP solution.
- Starting key services such as SSH, Windows File and Print Sharing, and the Windows Remote Registry Service in order for a credentialed scan to authenticate and interrogate the system.
- Credentials. A complete assessment requires remote login credentials to authenticate using the techniques above and to fully inspect the operating system and applications for vulnerabilities.
The Retina Network Security Scanner is designed to make vulnerability assessment simple and easy; even when environments are complex. It allows professionals to continuously assess their networks for security risks and provides beginners the tools needed to get started when best practices have never been performed before. In order to see Retina in action, please watch a video here. For more information on the Retina Network Security Scanner Unlimited, please click here. If you're ready to purchase, please visit our shopping cart here.