Internal Scanners
The Internal Scanners feature is available only for the VRMS and Penetration Testing products. Additionally, your subscribed plan must have the Internal Scanners feature enabled.
Overview of Internal Scanners
Internal Scanners are lightweight applications that you download and install inside your own network (on-premise or private infrastructure).
They allow you to:
- Run internal vulnerability scans (VRMS) or internal penetration tests without exposing your network to the public internet.
- Scan internal IP ranges that are not publicly accessible
- Securely connect your internal infrastructure to the Scanning Solution platform
Each Internal Scanner:
- Registers securely with your scanning solution account
- Connects through the Scanners Gateway
- Can be enabled for one or more subscribed products (VRMS and/or Penetration Testing)
This design allows you to maintain full control of your internal environment while leveraging the centralized reporting and management capabilities of the Scanning Solution.
How Internal Scanners Work
- You create a new scanner from the Scanners page.
- The platform generates:
- Authentication credentials
- Two dedicated ports
- Gateway connection details
- You install the scanner inside your network.
- The scanner establishes a secure tunnel to the Scanners Gateway.
- Once connected, it becomes available for internal scans.
Setting Up and Configuring Internal Scanners
Step 1 — Create a New Scanner
- Navigate to Menu → Scanners
- Click on New Scanner
- Fill out the form:
- Name: Choose a descriptive name for your scanner (e.g., "Office Network Scanner")
- Description: Optionally, add details about the scanner's purpose or location
- Click Save.
Step 2 — Review Scanner Configuration Details
After the scanner is created, you will see its configuration details:
🔐 User & Key
These are the credentials used by the scanner to authenticate with your portal.
- User → Scanner authentication username
- Key → Secret key used for secure connection
⚠️ Keep these credentials secure. They are required during the scanner installation process.
Management Port & Scanner Port
Two random ports are generated:
-
Management Port
- Used for secure management communication
- Handles control and orchestration commands
-
Scanner Port
- Used for scan traffic communication
- Transfers scan data securely
Each scanner has its own dedicated ports to ensure isolation and security.
Step 3 — Configure the Scanner in Your Network
Based on your endironment, find, download and follow the installation instructions for your scanner from the following link Scanner Installation Instructions.
Best Practices
- Install the scanner in a secure and stable environment.
- Avoid exposing the scanner directly to the internet.
- Restrict outbound access to only the required gateway.
- Monitor scanner health regularly.
- Use separate scanners for different network segments if required.